DOD Business Systems Modernization
Recent Slowdown in Institutionalizing Key Management Controls Needs to Be Addressed
Gao ID: GAO-09-586 May 18, 2009
Since 1995, GAO has designated the Department of Defense's (DOD) business systems modernization program as high risk, and it continues to do so today. To assist in addressing DOD's business system modernization challenges, the Ronald W. Reagan National Defense Authorization Act for Fiscal Year 2005 (the Act) contains provisions that require the department to take certain actions and to annually report to its congressional committees on these actions. The Act also directs GAO to review each annual report. In response, GAO performed its fifth annual review of DOD's actions to comply with key aspects in the Act and related federal guidance. To do so, GAO reviewed, for example, the latest version of DOD's business enterprise architecture (BEA) and transition plan, investment management policies and procedures, and information in the department's business system data repositories.
The pace of DOD's progress in defining and implementing key institutional modernization management controls has slowed compared with progress made in each of the last 4 years, leaving much still to be accomplished to fully implement the Act's requirements and related guidance. In particular, the corporate BEA continues to evolve and address previously identified missing elements, inconsistencies, and usability issues, but gaps still remain. For example, while the BEA now identifies information assurance laws, regulations, and policies, it still does not include business rules for all business processes. Further, little progress has been made in the last year in extending (i.e., federating) the BEA to the entire family of business mission area architectures, including using an independent verification and validation agent to assess the components' subsidiary architectures and federation efforts. The updated enterprise transition plan continues to identify systems and initiatives, but important elements are still missing, as are individual component plans. For example, while the plan provides a range of information, such as budgets and performance measures, for key enterprisewide and component-specific investments, it is missing information on identified investments. The fiscal year 2009 budget submission included some, but omitted other, key information about business system investments, in part because of the lack of a reliable comprehensive inventory of all defense business systems. Investment approval and accountability structures have been established for DOD and the Air Force, and related policies and procedures that are consistent with relevant guidance have been partially defined. However, these structures and processes are still lacking for the Navy. Business system investments costing over $1 million continue to be certified and approved, but these decisions are not always based on complete information. For example, key Navy investments have not fully demonstrated compliance with the department's BEA, and their economic justifications were not based on reliable estimates of cost and benefits. In addition, the information in DOD's authoritative repository of system investments that is used to make these decisions is not always accurate. Department officials attributed this slowdown in large part to pending decisions surrounding the roles, responsibilities, authorities, and relationships among key senior leadership positions, such as DOD's Deputy Chief Management Officer and the military departments' Chief Management Officers. Until DOD fully implements these long-standing institutional modernization management controls provided for under the Act, addressed in GAO recommendations, and otherwise embodied in relevant guidance, its business systems modernization will likely remain a high-risk program. As a result, it is important that the department act quickly to resolve pending decisions about key positions.
Recommendations
Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.
Director:
Team:
Phone:
GAO-09-586, DOD Business Systems Modernization: Recent Slowdown in Institutionalizing Key Management Controls Needs to Be Addressed
This is the accessible text file for GAO report number GAO-09-586
entitled 'DOD Business Systems Modernization: Recent Slowdown in
Institutionalizing Key Management Controls Needs to Be Addressed' which
was released on May 18, 2009.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as part
of a longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
Report to Congressional Committees:
United States Government Accountability Office:
GAO:
May 2009:
DOD Business Systems Modernization:
Recent Slowdown in Institutionalizing Key Management Controls Needs to
Be Addressed:
GAO-09-586:
GAO Highlights:
Highlights of GAO-09-586, a report to congressional committees.
Why GAO Did This Study:
Since 1995, GAO has designated the Department of Defense‘s (DOD)
business systems modernization program as high risk, and it continues
to do so today. To assist in addressing DOD‘s business system
modernization challenges, the Ronald W. Reagan National Defense
Authorization Act for Fiscal Year 2005 (the Act) contains provisions
that require the department to take certain actions and to annually
report to its congressional committees on these actions. The Act also
directs GAO to review each annual report. In response, GAO performed
its fifth annual review of DOD‘s actions to comply with key aspects in
the Act and related federal guidance. To do so, GAO reviewed, for
example, the latest version of DOD‘s business enterprise architecture
(BEA) and transition plan, investment management policies and
procedures, and information in the department‘s business system data
repositories.
What GAO Found:
The pace of DOD‘s progress in defining and implementing key
institutional modernization management controls has slowed compared
with progress made in each of the last 4 years, leaving much still to
be accomplished to fully implement the Act‘s requirements and related
guidance. In particular,
* The corporate BEA continues to evolve and address previously
identified missing elements, inconsistencies, and usability issues, but
gaps still remain. For example, while the BEA now identifies
information assurance laws, regulations, and policies, it still does
not include business rules for all business processes. Further, little
progress has been made in the last year in extending (i.e., federating)
the BEA to the entire family of business mission area architectures,
including using an independent verification and validation agent to
assess the components‘ subsidiary architectures and federation efforts.
* The updated enterprise transition plan continues to identify systems
and initiatives, but important elements are still missing, as are
individual component plans. For example, while the plan provides a
range of information, such as budgets and performance measures, for key
enterprisewide and component-specific investments, it is missing
information on identified investments.
* The fiscal year 2009 budget submission included some, but omitted
other, key information about business system investments, in part
because of the lack of a reliable comprehensive inventory of all
defense business systems.
* Investment approval and accountability structures have been
established for DOD and the Air Force, and related policies and
procedures that are consistent with relevant guidance have been
partially defined. However, these structures and processes are still
lacking for the Navy.
* Business system investments costing over $1 million continue to be
certified and approved, but these decisions are not always based on
complete information. For example, key Navy investments have not fully
demonstrated compliance with the department‘s BEA, and their economic
justifications were not based on reliable estimates of cost and
benefits. In addition, the information in DOD‘s authoritative
repository of system investments that is used to make these decisions
is not always accurate.
Department officials attributed this slowdown in large part to pending
decisions surrounding the roles, responsibilities, authorities, and
relationships among key senior leadership positions, such as DOD‘s
Deputy Chief Management Officer and the military departments‘ Chief
Management Officers. Until DOD fully implements these long-standing
institutional modernization management controls provided for under the
Act, addressed in GAO recommendations, and otherwise embodied in
relevant guidance, its business systems modernization will likely
remain a high-risk program. As a result, it is important that the
department act quickly to resolve pending decisions about key
positions.
What GAO Recommends:
Because GAO has existing recommendations that address most of the
weaknesses discussed in this report, it reiterates these
recommendations and further recommends that DOD resolve the issues
surrounding key modernization management positions and the quality of
investment-related information. DOD partially agreed with GAO‘s
recommendations and described either commitments or actions being
planned or under way to partially address them.
View [hyperlink, http://www.gao.gov/products/GAO-09-586] or key
components. For more information, contact Randolph C. Hite at (202) 512-
3439 or hiter@gao.gov.
[End of section]
Contents:
Letter:
Background:
DOD Continues to Take Steps to Strengthen Management of Its Business
Systems Modernization, but Long-standing Challenges Remain:
Conclusions:
Recommendations for Executive Action:
Agency Comments and Our Evaluation:
Appendix I: Objective, Scope, and Methodology:
Appendix II: Comments from the Department of Defense:
Appendix III: GAO Contact and Staff Acknowledgments:
Tables:
Table 1: DOD Business Systems Modernization Governance Entities' Roles,
Responsibilities, and Composition:
Table 2: DOD Investment Tiers:
Figures:
Figure 1: Simplified DOD Organization Structure:
Figure 2: The Five ITIM Stages of Maturity with Critical Processes:
Figure 3: Conceptual Representation of DOD's Business Mission Area
Federated Architecture:
Abbreviations:
ASD(NII)/DOD CIO: Assistant Secretary of Defense (Networks and
Information Integration)/Department of Defense Chief Information
Officer:
BEA: business enterprise architecture:
BTA: Business Transformation Agency:
CIO: Chief Information Officer:
CMO: Chief Management Officer:
DBSMC: Defense Business Systems Management Committee:
DITPR: Defense Information Technology Portfolio Repository:
DOD: Department of Defense:
ETP: enterprise transition plan:
IRB: Investment Review Board:
IT: information technology:
IV&V: independent verification and validation:
ITIM: Information Technology Investment Management:
NDAA: National Defense Authorization Act:
OMB: Office of Management and Budget:
SNAP-IT: Select and Native Programming Data Input System-Information
Technology:
[End of section]
United States Government Accountability Office:
Washington, DC 20548:
May 18, 2009:
Congressional Committees:
For decades, the Department of Defense (DOD) has been challenged in
modernizing its timeworn business systems.[Footnote 1] In 1995, we
designated DOD's business systems modernization program as high risk,
and we continue to designate it as such today.[Footnote 2] As our
research on public and private sector organizations shows, two
essential ingredients to a successful systems modernization program are
having a well-defined enterprise architecture and an effective
institutional approach to managing information technology (IT)
investments.[Footnote 3]
Accordingly, we made recommendations to the Secretary of Defense in May
2001 that included the means for effectively developing an enterprise
architecture and establishing a corporate, architecture-centric
approach to investment control and decision making.[Footnote 4] Between
2001 and 2005, we reported that the department's business systems
modernization program continued to lack both of these, concluding in
2005 that hundreds of millions of dollars had been spent on a business
enterprise architecture (BEA) and investment management structures that
had limited value.[Footnote 5] Accordingly, we made more explicit
architecture and investment management-related recommendations.
To further assist DOD in addressing these modernization management
challenges, Congress included provisions in the Ronald W. Reagan
National Defense Authorization Act for Fiscal Year 2005 (the Act) that
were consistent with our recommendations.[Footnote 6] More
specifically, the Act requires the department to, among other things,
(1) develop a BEA, (2) develop a transition plan to implement the
architecture, (3) identify systems information in its annual budget
submission, (4) establish a system investment approval and
accountability structure, (5) establish an investment review process,
and (6) certify and approve any system modernizations costing in excess
of $1 million. The Act further requires that the Secretary of Defense
submit an annual report to congressional defense committees on DOD's
compliance with certain requirements of the Act not later than March 15
of each year from 2005 through 2009. Additionally, the Act directs us
to submit to these congressional committees--within 60 days of DOD's
report submission--an assessment of DOD's actions to comply with these
requirements.
As agreed with your offices, the objective of our review was to assess
the actions taken by DOD to comply with requirements of section 2222 of
Title 10, U.S. Code. To accomplish this, we used our prior annual
report under the Act as a baseline, analyzing whether the department
had taken actions to comply with those requirements, related guidance,
and our prior recommendations that we previously identified as not yet
addressed.[Footnote 7] In doing this, we also relied on the results of
relevant reports that we have issued since our prior annual report.
[Footnote 8] We also reviewed the department's report to Congress,
which was submitted on March 18, 2009, and evaluated the information
used to satisfy the budget submission and investment review,
certification, and approval aspects of the Act.
We conducted this performance audit at DOD offices in Arlington,
Virginia, from January to May 2009, in accordance with generally
accepted government auditing standards. Those standards require that we
plan and perform the audit to obtain sufficient, appropriate evidence
to provide a reasonable basis for our findings and conclusions based on
our audit objectives. We believe that the evidence obtained provides a
reasonable basis for our findings and conclusions based on our audit
objectives. Details on our objective, scope, and methodology are
contained in appendix I.
Background:
DOD is a massive and complex organization and is entrusted with more
taxpayer dollars than any other federal department or agency. To
illustrate, Congress provided DOD with about $512 billion in
appropriations for fiscal year 2009. Additionally, Congress has
provided about $808 billion in supplemental emergency funding for
operations in support of the Global War on Terrorism since 2001.
Moreover, the recent American Recovery and Reinvestment Act of 2009
contains nearly $12.6 billion in appropriations for DOD for military
construction, environmental restoration, and other purposes.
Organizationally, the department includes the Office of the Secretary
of Defense, the Joint Chiefs of Staff, the military departments,
numerous defense agencies and field activities, and various unified
combatant commands that are responsible for either specific geographic
regions or specific functions. (See figure 1 for a simplified depiction
of DOD's organizational structure.)
Figure 1: Simplified DOD Organization Structure:
[Refer to PDF for image: illustration of the DOD Organizational
Structure]
Top level:
* Secretary of Defense;
* Deputy Secretary of Defense[A].
Next level, reporting to the Secretary of Defense:
* Department of the Army;
* Department of the Navy;
* Department of the Air Force;
* Office of the Secretary of Defense:
* DOD field activities;
- Defense agencies;
- Inspector General;
* Joint Chiefs of Staff;
* Combatant commands[B].
Source: GAO based on DOD documentation.
[A] The Deputy Secretary of Defense serves as the Chief Management
Officer, who provides focused and sustained leadership over DOD's
business transformation efforts.
[B] The Chairman of the Joint Chiefs of Staff serves as the spokesman
for the commanders of the combatant commands, especially on the
administrative requirements of the commands.
[End of figure]
In support of its military operations, the department performs an
assortment of interrelated and interdependent business functions,
including logistics management, procurement, health care management,
and financial management. As we have previously reported, the DOD
systems environment that supports these business functions is overly
complex and error prone, and is characterized by (1) little
standardization across the department, (2) multiple systems performing
the same tasks, (3) the same data stored in multiple systems, and (4)
the need for data to be entered manually into multiple system[Footnote
9]s. Moreover, the department recently reported that this systems
environment is composed of approximately 2,480 separate business
systems. For fiscal year 2009, DOD requested about $15.3 billion in
funds to operate, maintain, and modernize these business systems and
associated IT infrastructure.
As we have previously reported, the department's nonintegrated and
duplicative systems impair its ability to combat fraud, waste, and
abuse.[Footnote 10] In fact, DOD currently bears responsibility, in
whole or in part, for 15 of our 30 high-risk areas.[Footnote 11] Eight
of these areas are specific to the department,[Footnote 12] while it
shares responsibility for 7 other governmentwide high-risk areas.
[Footnote 13] Collectively, these high-risk areas relate to DOD's major
business operations that are inextricably linked to the department's
ability to perform its overall mission, directly affect the readiness
and capabilities of U.S. military forces, and can affect the success of
a mission. DOD's business systems modernization is one of the high-risk
areas, and it is an essential enabler to addressing many of the
department's other high-risk areas. For example, modernized business
systems are integral to the department's efforts to address its
financial, supply chain, and information security management high-risk
areas.
Enterprise Architecture and IT Investment Management Controls Are
Critical to Achieving Successful Systems Modernization:
Effective use of an enterprise architecture--a modernization blueprint--
is a hallmark of successful public and private organizations. Since the
early 1990s, we have promoted the use of architectures to guide and
constrain systems modernization, recognizing them as a crucial means to
meeting this challenging goal: optimally defined operational and
technological environments. Congress, the Office of Management and
Budget (OMB), and the federal Chief Information Officers (CIO) Council
have also recognized the importance of an architecture-centric approach
to modernization. The Clinger-Cohen Act of 1996 mandates that an
agency's CIO develop, maintain, and facilitate the implementation of an
information technology architecture.[Footnote 14] Further, the E-
Government Act of 2002 requires OMB to oversee the development of
enterprise architectures within and across agencies.[Footnote 15] In
addition, we, OMB, and the CIO Council have issued guidance that
emphasizes the need for system investments to be consistent with these
architectures.[Footnote 16] For example, in April 2003, we issued a
framework that emphasizes the importance of having an enterprise
architecture as a critical frame of reference for organizations when
they are making IT investment decisions.[Footnote 17] Also, in December
2008, OMB issued guidance that addresses system investment compliance
with agency architectures.[Footnote 18]
A corporate approach to IT investment management is another important
characteristic of successful public and private organizations.
Recognizing this, Congress enacted the Clinger-Cohen Act of 1996,
[Footnote 19] which requires OMB to establish processes to analyze,
track, and evaluate the risks and results of major capital investments
in IT systems made by executive agencies.[Footnote 20] In response to
the Clinger-Cohen Act and other statutes, OMB has developed policy and
issued guidance for planning, budgeting, acquisition, and management of
federal capital assets.[Footnote 21] We have also issued guidance in
this area that defines institutional structures (such as investment
boards), processes for developing information on investments (such as
cost/benefit), and practices to inform management decisions (such as
whether a given investment is aligned with an enterprise architecture.
[Footnote 22]
Enterprise Architecture: A Brief Description:
An enterprise architecture provides a clear and comprehensive picture
of an entity, whether it is an organization (e.g., a federal
department) or a functional or mission area that cuts across more than
one organization (e.g., financial management). An architecture
describes the enterprise in logical terms (such as interrelated
business processes and business rules, information needs and flows, and
work locations and users) as well as in technical terms (such as
hardware, software, data, communications, security attributes, and
performance standards). It provides these perspectives both for the
enterprise's current, or "as is," environment, and for its target, or
"to be," environment, and it provides a transition plan for moving from
the "as is" to the "to be" environment. This transition plan provides a
temporal road map for moving between the two environments and
incorporates such considerations as technology opportunities,
marketplace trends, fiscal and budgetary constraints, institutional
system development and acquisition capabilities, legacy and new system
dependencies and life expectancies, and the projected value of
competing investments.
The suite of products produced for a given entity's enterprise
architecture, including its structure and content, is largely governed
by the framework used to develop the architecture. Since the 1980s,
various architecture frameworks have been developed, such as John A.
Zachman's "A Framework for Information Systems Architecture"[Footnote
23] and the DOD Architecture Framework.[Footnote 24]
The importance of developing, implementing, and maintaining an
enterprise architecture is a basic tenet of both organizational
transformation and systems modernization. Managed properly, an
enterprise architecture can clarify and help optimize the
interdependencies and relationships among an organization's business
operations and the underlying IT infrastructure and applications that
support these operations. Moreover, when an enterprise architecture is
employed in concert with other important management controls, such as
portfolio-based capital planning and investment control practices,
architectures can greatly increase the chances that an organization's
operational and IT environments will be configured to optimize mission
performance. The alternative, as our work has shown, is the
perpetuation of the kinds of operational environments that burden many
agencies today, where a lack of integration among business operations
and the IT resources supporting them leads to systems that are
duplicative, poorly integrated, and unnecessarily costly to maintain
and interface.[Footnote 25] Our framework provides federal agencies
with a common benchmarking tool for planning and measuring their
efforts to improve enterprise architecture management.[Footnote 26]
One approach to structuring an enterprise architecture is referred to
as a federated enterprise architecture. Such a structure treats the
architecture as a family of coherent but distinct member architectures
that conform to an overarching architectural view and rule set. This
approach recognizes that each member of the federation has unique goals
and needs as well as common roles and responsibilities with the levels
above and below it. Under a federated approach, member architectures
are substantially autonomous, although they also inherit certain rules,
policies, procedures, and services from higher-level architectures. As
such, a federated architecture gives autonomy to an organization's
components while ensuring enterprisewide linkages and alignment where
appropriate. Where commonality among components exists, there are also
opportunities for identifying and leveraging shared services.
A service-oriented architecture is an approach for sharing business
capabilities across the enterprise by designing functions and
applications as discrete, reusable, and business-oriented services. As
such, service orientation permits sharing capabilities that may be
under the control of different component organizations. As we have
previously reported, such capabilities or services need to be, among
other things, (1) self-contained, meaning that they do not depend on
any other functions or applications to execute a discrete unit of work;
(2) published and exposed as self-describing business capabilities that
can be accessed and used; and (3) subscribed to via well-defined and
standardized interfaces.[Footnote 27] A service-oriented architecture
approach is thus intended not only to reduce redundancy and increase
integration, but also to provide the kind of flexibility needed to
support a quicker response to changing and evolving business
requirements and emerging conditions.
IT Investment Management: A Brief Description:
IT investment management is a process for linking IT investment
decisions to an organization's strategic objectives and business plans
that focuses on selecting, controlling, and evaluating investments in a
manner that minimizes risks while maximizing the return of
investment.[Footnote 28]
* During the selection phase, the organization (1) identifies and
analyzes each project's risks and returns before committing significant
funds to any project and (2) selects those IT projects that will best
support its mission needs.
* During the control phase, the organization ensures that as projects
develop and investment expenditures continue, they continue to meet
mission needs at the expected levels of cost and risk. If the project
is not meeting expectations, or if problems arise, steps are quickly
taken to address the deficiencies.
* During the evaluation phase, actual versus expected results are
compared once a project has been fully implemented. This is done to (1)
assess the project's impact on mission performance, (2) identify any
changes or modifications to the project that may be needed, and (3)
revise the investment management process based on lessons learned.
Consistent with this guidance, our IT Investment Management (ITIM)
framework consists of five progressive stages of maturity for any given
agency relative to selecting, controlling, and evaluating its
investment management capabilities.[Footnote 29] (See figure 2 for the
five ITIM stages of maturity.) The overriding purpose of the framework
is to encourage investment selection and control and to evaluate
processes that promote business value and mission performance, reduce
risk, and increase accountability and transparency. We have used the
framework in several of our evaluations, and a number of agencies have
adopted it.[Footnote 30]
In our ITIM framework, with the exception of the first stage, each
maturity stage is composed of "critical processes" that must be
implemented and institutionalized in order for the organization to
achieve that stage. Each ITIM critical process consists of "key
practices"--to include organizational structures, policies, and
procedures--that must be executed to implement the critical process.
Our research shows that agency efforts to improve investment management
capabilities should focus on implementing all lower-stage practices
before addressing higher-stage practices.
Figure 2: The Five ITIM Stages of Maturity with Critical Processes:
[Refer to PDF for image: illustration]
Maturity Stage: Stage 1: Creating investment awareness;
Critical processes:
* IT spending without disciplined investment processes.
Maturity Stage: Stage 2: Building the investment foundation;
Critical processes:
* Instituting the investment board;
* Meeting business needs;
* Selecting an investment;
* Providing investment oversight;
* Capturing investment information.
Maturity Stage: Stage 3: Developing a complete investment portfolio;
Critical processes:
* Defining the portfolio criteria;
* Creating the portfolio;
* Evaluating the portfolio;
* Conducting postimplementation reviews.
Maturity Stage: Stage 4: Improving the investment process;
Critical processes:
* Improving the portfolio's performance;
* Managing the succession of information systems.
Maturity Stage: Stage 5: Leveraging IT for strategic outcomes.
Critical processes:
* Optimizing the investment process;
* Using IT to drive strategic business change.
Source: GAO.
[End of figure]
Stage 2 critical processes lay the foundation by establishing
successful, predictable, and repeatable investment control processes at
the project level. Stage 3 is where the agency moves from project-
centric processes to portfolio-based processes and evaluates potential
investments according to how well they support the agency's missions,
strategies, and goals. Organizations implementing these Stage 2 and 3
practices have in place selection, control, and evaluation processes
that are consistent with the Clinger-Cohen Act.[Footnote 31] Stages 4
and 5 require the use of evaluation techniques to continuously improve
both investment processes and portfolios in order to better achieve
strategic outcomes.
DOD's Institutional Approach to Business Systems Modernization:
The National Defense Authorization Act (NDAA) for Fiscal Year 2008
designated the Deputy Secretary of Defense as the Chief Management
Officer (CMO) for DOD and created a Deputy CMO position.[Footnote 32]
The CMO's responsibilities include developing and maintaining a
departmentwide strategic plan for business reform and establishing
performance goals and measures for improving and evaluating overall
economy, efficiency, and effectiveness and monitoring and measuring the
progress of the department. The Deputy CMO's responsibilities include
recommending to the CMO methodologies and measurement criteria to
better synchronize, integrate, and coordinate the business operations
to ensure alignment in support of the warfighting mission. The Business
Transformation Agency (BTA) supports the Deputy CMO in leading and
coordinating business transformation efforts across the department.
The CMO and Deputy CMO are to interact with several entities to provide
executive leadership for the direction, oversight, and execution of
DOD's business transformation efforts, which include business systems
modernization. These entities include the Defense Business Systems
Management Committee (DBSMC), which serves as the highest-ranking
investment review and decision-making body for business systems
modernization activities and is chaired by the Deputy Secretary of
Defense; the Principal Staff Assistants, who serve as the certification
authorities for business system modernizations in their respective core
business missions; the Investment Review Boards (IRB), which are
chaired by the certifying authorities and form the review and decision-
making bodies for business system investments in their respective areas
of responsibility; and the BTA, which is responsible for supporting the
IRBs, and for leading and coordinating business transformation efforts
across the department. Table 1 lists these entities and provides
greater detail on their roles, responsibilities, and composition.
Table 1: DOD Business Systems Modernization Governance Entities' Roles,
Responsibilities, and Composition:
Entity: DBSMC;
Roles and responsibilities:
* Provides strategic direction and plans for the business mission area
in coordination with the warfighting and enterprise information
environment mission areas[A];
* Recommends policies and procedures required to integrate DOD business
transformation and attain cross-department, end-to-end interoperability
of business systems and processes;
* Serves as approving authority for business system modernization; *
Establishes policies and approves the business mission area strategic
plan, the enterprise transition plan for implementation of business
systems modernization, the transformation program baseline, and the
BEA;
Composition: Chaired by the Deputy Secretary of Defense/CMO; the Vice
Chair is the Under Secretary of Defense for Acquisition, Technology,
and Logistics. Includes senior leadership in the Office of the
Secretary of Defense such as the Assistant Secretary of Defense
(Networks and Information Integration)/Department of Defense Chief
Information Officer (ASD(NII)/DOD CIO), the military departments'
Secretaries and defense agencies' heads, the Vice Chairman of the Joint
Chiefs of Staff, and the Commanders of the U.S. Transportation Command
and Joint Forces Command.
Entity: Principal Staff Assistants/Certification Authorities;
Roles and responsibilities:
* Support the DBSMC's management of enterprise business IT investments;
* Serve as the certification authorities accountable for the obligation
of funds for respective business system modernizations within
designated core business missions[B];
* Provide the DBSMC with recommendations for system investment
approval;
Composition: Under Secretaries of Defense for Acquisition, Technology,
and Logistics; Comptroller; and Personnel and Readiness; ASD(NII)/DOD
CIO; and the Deputy Secretary of Defense.
Entity: IRBs;
Roles and responsibilities:
* Serve as the oversight and investment decision-making bodies for
those business capabilities that support activities under their
designated areas of responsibility;
* Recommend certification for all business systems investments costing
more than $1 million that are integrated and compliant with the BEA;
Composition: Includes the Principal Staff Assistants, Joint Staff,
ASD(NII)/DOD CIO, core business mission area representatives, military
departments, defense agencies, and combatant commands.
Entity: Component Precertification Authority;
Roles and responsibilities:
* Ensures component-level investment review processes integrate with
the investment management system;
* Identifies those component systems that require IRB certification and
prepare, review, approve, validate, and transfer investment
documentation as required;
* Assesses and precertifies architecture compliance of component
systems submitted for certification and annual review;
* Acts as the component's principal point of contact for communication
with the IRBs;
Composition: Includes the CIO from the Air Force; the Principal
Director of Governance, Acquisition, and Chief Knowledge Office from
the Army; the CIO from the Navy; and comparable representatives from
other defense agencies.
Entity: BTA;
Roles and responsibilities:
* Operates under the authority of the Deputy CMO;
* Maintains and updates the department's BEA and enterprise transition
plan;
* Ensures that functional priorities and requirements of various
defense components, such as the Army and the Defense Logistics Agency,
are reflected in the architecture;
* Ensures adoption of DOD-wide information and process standards as
defined in the architecture;
* Serves as the day-to-day management entity of the business
transformation effort at the DOD enterprise level;
* Provides support to the IRBs; Composition:
Composed of eight directorates (Chief of Staff, Defense Business
Systems Acquisition Executive, Enterprise Integration, Enterprise
Planning and Investment, Transformation Priorities and Requirements
Financial Management, Transformation Priorities and Requirements Human
Resource Management, Transformation Priorities and Requirements Supply
Chain Management, and Warfighter Requirements).
Source: GAO based on DOD documentation.
[A] According to DOD, the business mission area is responsible for
ensuring that capabilities, resources, and materiel are reliably
delivered to the warfighter. Specifically, the business mission area
addresses areas such as real property and human resources management.
[B] DOD has five core business missions: Human Resources Management,
Weapon System Lifecycle Management, Materiel Supply and Service
Management, Real Property and Installations Lifecycle Management, and
Financial Management.
[End of table]
Tiered Accountability:
In 2005, DOD reported that it had adopted a "tiered accountability"
approach to business systems modernization. Under this approach,
responsibility and accountability for business architectures and
systems investment management are assigned to different levels in the
organization. For example, the BTA is responsible for developing the
corporate BEA (i.e., the thin layer of DOD-wide policies, capabilities,
standards, and rules) and the associated enterprise transition plan
(ETP). The components are responsible for defining a component-level
architecture and transition plans associated with their own tiers of
responsibility and for doing so in a manner that is aligned with (i.e.,
does not violate) the corporate BEA. Similarly, program managers are
responsible for developing program-level architectures and plans and
ensuring alignment with the architectures and transition plans above
them. This concept is to allow for autonomy while also ensuring
linkages and alignment from the program level through the component
level to the corporate level. Table 2 describes the four investment
tiers and identifies the associated reviewing and approving entities.
Table 2: DOD Investment Tiers:
Tier 1; Tier description: Major Automated Information System[A] or
Major Defense Acquisition Program[B];
Reviewing/approving entities: IRB and DBSMC.
Tier 2; Tier description: Exceeding $10 million in total development/
modernization costs, but not designated as a Major Automated
Information System or Major Defense Acquisition Program;
Reviewing/approving entities: IRB and DBSMC.
Tier 3; Tier description: Exceeding $1 million and up to $10 million in
total development/modernization costs;
Reviewing/approving entities: IRB and DBSMC.
Tier 4; Tier description: Investment funding required up to $1 million;
Reviewing/approving entities: Component-level review only (unless the
system or line of business it supports is designated as an interest
program by the IRB chair).
Source: GAO based on DOD documentation.
[A] A Major Automated Information System is a program or initiative
that is so designated by the ASD(NII)/DOD CIO or that is estimated to
require program costs in any single year in excess of $32 million,
total program costs in excess of $126 million, or total life cycle
costs in excess of $378 million in fiscal year 2000 constant dollars.
[B] A Major Defense Acquisition Program is an acquisition program that
is so designated or estimated by the Under Secretary of Defense for
Acquisition, Technology, and Logistics to require an eventual total
expenditure for research, development, and test and evaluation of more
than $365 million or, for procurement, of more than $2.190 billion in
fiscal year 2000 constant dollars.
[End of table]
Consistent with the tiered accountability approach, the NDAA for Fiscal
Year 2008 required the Secretaries of the military departments to
designate the department Under Secretaries as CMOs with primary
responsibility for business operations.[Footnote 33] Moreover, the
Duncan Hunter NDAA for Fiscal Year 2009 requires the military
departments to establish business transformation offices to assist
their CMOs.[Footnote 34]
Summary of Fiscal Year 2005 NDAA Requirements:
Congress included six provisions in the fiscal year 2005 NDAA that are
aimed at ensuring DOD's development of a well-defined BEA and
associated ETP, as well as the establishment and implementation of
effective investment management structures and processes.[Footnote 35]
The requirements are as follows:
1. Develop a BEA that includes an information infrastructure that, at a
minimum, would enable DOD to:
* comply with all federal accounting, financial management, and
reporting requirements;
* routinely produce timely, accurate, and reliable financial
information for management purposes;
* integrate budget, accounting, and program information and systems;
and:
* provide for the systematic measurement of performance, including the
ability to produce timely, relevant, and reliable cost information.
In addition, the BEA must:
* include policies, procedures, data standards, and system interface
requirements that are to be applied uniformly throughout the department
and:
* be consistent with OMB policies and procedures.
2. Develop an ETP for implementing the architecture that includes:
* an acquisition strategy for new systems needed to complete the
enterprise architecture;
* a list and schedule of legacy business systems to be terminated;
* a list and strategy of modifications to legacy business systems; and:
* time-phased milestones, performance metrics, and a statement of
financial and nonfinancial resource needs.
3. Identify each business system proposed for funding in DOD's fiscal
year budget submissions and include:
* a description of the certification made on each business system
proposed for funding in that budget;
* funds, identified by appropriations, for current services and for
business systems modernization; and:
* the designated approval authority for each business system.
4. Delegate the responsibility for business systems to designated
approval authorities within the Office of the Secretary of Defense.
5. Require each approval authority to establish investment review
structures and processes, including a hierarchy of IRBs--each with
appropriate representation from across the department. The review
process must include:
* a review and approval of each business system by an IRB before funds
are obligated;
* at least an annual review of every business system investment;
* the use of threshold criteria to ensure an appropriate level of
review and accountability;
* the use of procedures for making architecture compliance
certifications;
* the use of procedures consistent with DOD guidance; and:
* the incorporation of common decision criteria.
6. Effective October 1, 2005, DOD may not obligate appropriated funds
for a defense business system modernization with a total cost of more
than $1 million unless the approval authority certifies that the
business system modernization:
* complies with the BEA; or:
* is necessary to achieve a critical national security capability or
address a critical requirement in an area such as safety or security,
or is necessary to prevent a significant adverse effect on an essential
project in consideration of alternative solutions; and:
* the certification is approved by the DBSMC.
The fiscal year 2005 NDAA also requires that the Secretary of Defense
submit to the congressional defense committees a report on the
department's compliance with the above provisions.
Summary of Recent GAO Reviews of DOD's Business Systems Modernization
and Business Transformation Efforts:
Since 2005, we have reported that DOD has each year taken increasing
steps to comply with the requirements of the fiscal year 2005 NDAA and
to satisfy relevant systems modernization management guidance.[Footnote
36] Moreover, we concluded that DOD had made important progress each
year relative to architecture development, transition plan development,
budgetary disclosure, and investment review; however, aspects of these
requirements and relevant guidance had yet to be fully satisfied. We
also reported that DOD had fully satisfied the requirement concerning
designated approval authorities and continued to certify and approve
modernizations costing more than $1 million. However, each report also
concluded that much remained to be accomplished relative to the Act's
requirements and relevant guidance, as these examples illustrate:
* The BEA lacked important content, such as business rules for, and
information flows among, certain business activities, and it had yet to
be extended (i.e., federated) throughout the DOD component
organizations.
* The ETP did not include investments for all components and did not
reflect key factors associated with properly sequencing planned
investments, such as dependencies among investments and the capability
to execute the plan.
* DOD and the military departments had yet to fully establish key
investment review structures and define related policies and procedures
for effectively performing both project-level and portfolio-based
investment management.
Accordingly, we either provided new or reiterated existing
recommendations to address each of these areas. DOD largely agreed with
our recommendations. In August 2008, we also reported on issues with
the process used to certify investments as compliant with DOD's BEA
[Footnote 37]. Specifically, we reported that key DOD business systems
modernization programs did not adequately demonstrate compliance with
the department's federated BEA, even though each program had largely
followed DOD's existing compliance guidance, used its compliance
assessment tool, and was certified and approved as being compliant by
department investment oversight and decision-making entities. In
addition, we reported that even though the department's investment
oversight and decision-making authorities had certified and approved
these business system programs as compliant with the BEA, these
certification and approval entities did not validate each program's
compliance assessment and assertions. Accordingly, we made
recommendations to address each of those shortcomings, which DOD agreed
with.
With respect to departmentwide business transformation, we recently
reported that implementation of DOD's overall management framework for
business transformation is not yet complete because key aspects had not
been defined.[Footnote 38] For example, we reported that the authority,
roles, and relationships for some positions and entities had not been
clearly defined, including a clearly defined decision-making authority
for the Deputy CMO, a clearly defined relationship between DOD's Deputy
CMO and the CMOs of the military departments, and clearly defined
unique and shared responsibilities of various governance entities, such
as the Deputy's Advisory Working Group and the DBSMC. We concluded that
the current administration needed to move quickly to nominate and fill
key leadership positions, including the Deputy Secretary of Defense
(now statutorily designated as the CMO), the Deputy CMO, the Under
Secretaries of Defense, and the military department CMOs. We also
concluded that, in light of the transition, it will be important for
senior leaders in the current administration to further define and
clarify the roles, responsibilities, and relationships among the
various positions and governance entities within DOD's management
framework for business transformation in order to sustain and further
DOD's progress.
In addition, we reported that DOD's first strategic management plan,
issued in 2008, lacked key information and elements necessary for
assisting in successfully achieving business management transformation.
[Footnote 39] For example, it did not identify any strategic goals,
objectives, and performance measures, and while it stated a purpose,
the plan did not provide detailed information about business
operations. Without strategic goals and objectives, we concluded that
the strategic management plan could not be linked to other existing
plans and tools for individual business areas, such as the ETP.
DOD Continues to Take Steps to Strengthen Management of Its Business
Systems Modernization, but Long-standing Challenges Remain:
DOD continues to take steps to comply with the requirements of the Act
and to satisfy relevant systems modernization management guidance. In
particular, DOD released an update to its corporate BEA (version 6.0)
and ETP, and issued its annual report to Congress describing steps that
have been taken and are planned relative to the Act's requirements,
among other things. Collectively, these steps address several statutory
provisions and best practices concerning the BEA, transition plan,
budgetary disclosure, and investment review of systems costing in
excess of $1 million. However, the pace of DOD's progress in defining
and implementing these key modernization management controls has slowed
compared with the progress the department had made, and we have
reported, each of the last 4 years. As a result, challenges that we
identified last year largely remain to be addressed to fully implement
the Act and relevant guidance. Most notably, the department has yet to
extend and evolve its BEA and to provide the total federated family of
DOD parent and subsidiary architectures for the business mission area,
which are needed to comply with the Act. It also has yet to fully
define IT investment management policies and procedures at the
corporate and component levels, and the business system information
used to support the development of the transition plan and DOD's budget
requests, as well as certification and annual reviews, is of
questionable reliability. DOD officials agree that additional steps are
needed to fully implement the Act's requirements and related system
modernization management best practices. Further, they stated that
progress over the last year has been slowed by yet-to-be-resolved
issues surrounding the Deputy CMO and military department CMO
positions.
DOD Continues to Evolve Its Corporate BEA, but a Well-Defined Plan for
Federating It Has Yet to Be Developed and Progress on Component
Architectures Has Been Slow:
Among other things, the fiscal year 2005 NDAA requires DOD to develop a
BEA that would cover all defense business systems and their related
functions and activities and that would enable the entire department to
(1) comply with all federal accounting, financial management, and
reporting requirements and (2) routinely produce timely, accurate, and
reliable financial information for management purposes. The BEA should
also include policies, procedures, data standards, and system interface
requirements that are to be applied throughout the department. As such,
the Act requires an architecture that extends to all defense
organizational components. In 2006, the department adopted an
incremental and federated approach to developing such an architecture.
Under this approach, the department releases new architecture versions
every year that include a corporate BEA that is to be augmented by a
coherent family of component architectures. As we have previously
reported, such an approach is consistent with best practices and
appropriate given DOD's scope and size.
In 2008, we reported that the then-current version of the BEA (version
5.0) addressed, to varying degrees, missing elements, inconsistencies,
and usability issues that we previously identified, but that gaps still
remained.[Footnote 40] On March 13, 2009, DOD released BEA 6.0, which
addresses some of these gaps. For example, it begins to address
information assurance by identifying related laws, regulations, and
policies.[Footnote 41] This is important because the nature and
substance of institutionalized security requirements, controls, and
standards should be captured in the architecture products, since
information assurance permeates every aspect of an organization's
operations. In addition, the latest version of the BEA begins to
address the technical standards (e.g., W3C XML-Encryption[Footnote 42])
needed to allow business systems to work in an expeditionary
environment, which would, among other things, allow warfighters
operating in these environments to access business systems.[Footnote
43]
Version 6.0 of the BEA also addresses, to varying degrees, missing
elements, inconsistencies, and usability issues that we previously
identified, but continues to be missing important content. Examples of
these improvements and remaining issues are summarized below.
* The latest version includes 35 new business rules. As we previously
reported, business rules are important because they translate business
policies and procedures into specific, unambiguous rules that govern
what can and cannot be done. As such, they facilitate consistent
implementation of laws, policies, and procedures. Examples of new
business rules in the Common Supplier Engagement business priority area
[Footnote 44] are (1) an accepting or inspecting organization must be
provided on all contracts for goods or services and (2) both a minimum
and a maximum ordering limit must be provided when the contract is an
indefinite delivery/indefinite quantity contract.[Footnote 45] In
addition to adding business rules, Version 6.0 reflects the deletion of
22 business rules that, according to DOD, were no longer applicable and
were thus obsolete. Notwithstanding these additions and deletions, BEA
6.0 still does not provide business rules for all business processes.
For example, there are no business rules for the File Discrepancy
Report for Other Goods and Services business process in the Common
Supplier Engagement and Materiel Visibility business priority areas.
[Footnote 46] Such limitations in DOD's business rules limit the
department's ability to ensure that business operations and supporting
systems are properly implemented.
* The latest version includes additional information on important
security architecture content. For example, it now identifies
information assurance laws, regulations, and policies and describes
information assurance characteristics of key information exchanges
(e.g., Awarded Contract is designated as a sensitive information
exchange[Footnote 47]). However, not all financial information
exchanges (e.g., Receipt Account Trial Balance and Ledgers[Footnote
48]) include such key information assurance characteristics as
confidentiality, integrity, and nonrepudiation. Without specifying such
information assurance characteristics for all relevant exchanges, DOD
will be limited in its ability to implement adequate security controls
into the systems that support these exchanges.
* The latest version continues to add new operational activities, which
describe actions performed in conducting DOD business operations (e.g.,
Deliver Property and Forces[Footnote 49]). These operational activities
are important because they are DOD's primary basis for determining if a
system is being defined in a way that is compliant with the BEA.
However, key operational activities are not yet included in the BEA.
For example, Version 6.0 still does not include the Foreign Military
Sales operational activity, which affects multiple DOD business
missions and organizations. Without including such important
operational activities, programs do not have all the information
necessary for determining if they are compliant with applicable
constraints (e.g., data definitions and business rules).
* The latest version includes updates on the information that flows
among operational nodes (i.e., organizations, business operations, and
system elements). Information flows are important because they define
what information is needed and where and how the information moves to
and from operational entities. While Version 6.0 adds approximately 50
new information exchanges (e.g., Approved Payment Request[Footnote 50])
among business functions and approximately 15 data exchanges (e.g.,
Payment Request for Goods[Footnote 51]) among system functions, it
still contains information exchanges (e.g., Accounts Payable Account
[Footnote 52]) that are not attached or linked to any operational nodes
(or organizations). Further, this version's information-related
architecture products contain inconsistencies. For example, information
exchanges such as Final Contract or Order Costs and Estimate at
Completion[Footnote 53] are listed in the information exchange
integrated dictionary, but are not listed in the operational
information exchange product.[Footnote 54] As a result, DOD's ability
to understand how information is shared among operational entities, and
subsequently develop or modernize systems that can effectively share
such information, will be constrained.
* The latest version also depicts end-to-end business flows (e.g.,
Budget to Report[Footnote 55]) with linkages to BEA business processes
(e.g., Execute Apportionment and Allocate Funds[Footnote 56]). However,
BEA 6.0 does not include, for each end-to-end business flow, a create,
read, update, and delete matrix[Footnote 57] that shows how the
business processes and their associated applications manage specific
data objects (e.g., Approved Apportionment[Footnote 58]). These
matrices are important because they reveal natural groupings of
business activities and data objects, and thus are used to identify
business activities to be automated. Without this information, DOD will
be limited in its ability to develop a target architecture that
effectively integrates information and systems that support its
business activities.
BTA officials recognize many of these issues and state that they will
be addressed as the BEA continues to evolve. In this regard, the Chief
Architect stated that the process for evolving the BEA is described in
the architecture's Concept of Operations. Specifically, it describes a
process that calls for business cases to justify proposed improvements
that are then prioritized and used to create a BEA plan for DBSMC
approval. However, the Concept of Operations has yet to be approved,
and available documentation does not demonstrate that this process is
being followed. Further, we have yet to receive an architecture plan or
evidence of DBSMC approval of such a plan. As we have previously
reported and recommended, BTA needs an enterprise architecture program
management plan that defines what the department's incremental
improvements to the architecture (and transition plan) will be, and how
and when they will be accomplished, including what (and when)
architecture and transition plan scope and content and architecture
compliance criteria will be added into which versions.[Footnote 59] BTA
has not yet developed such a plan. According to BTA officials, the
department's next steps are contingent upon ongoing discussions about
how architecture planning will be affected by the Deputy CMO's efforts
to align the department's various planning activities in its strategic
management plan, which is to be issued no later than July 1, 2009.
These discussions will be further complicated by the lack of clarity
surrounding the Deputy CMO's roles, responsibilities, and authorities
and how the deputy will work with other senior leaders across the
department who have responsibility for business operations.
Beyond the above-discussed limitations, Version 6.0 also continues to
represent only the thin layer of corporate architectural policies,
capabilities, rules, and standards that apply DOD-wide (i.e., to all
DOD federation members). This means that Version 6.0 appropriately
focuses on addressing a limited set of enterprise-level (DOD-wide)
priorities and providing the overarching and common architectural
context that the distinct and substantially autonomous member (i.e.,
component) architectures inherit. However, this also means that Version
6.0 does not provide the total federated family of DOD parent and
subsidiary architectures for the business mission area.
DOD's Progress in Federating Its BEA Has Been Slow:
Recognizing the need to address its component architecture challenges,
BTA released an update to its initial business mission area federation
strategy and road map in January 2008. Among other things, this
strategy was to address how the corporate BEA would be extended to the
military departments and defense agencies and how business services
will be identified and delivered across the business mission area. (See
figure 3 for a conceptual representation of DOD's federated BEA.)
Figure 3: Conceptual Representation of DOD's Business Mission Area
Federated Architecture:
[Refer to PDF for image: illustration]
BTA: Composed of:
DOD BEA and enterprise transition plan;
Enterprise shared services and system capabilities;
Enterprise rules and standards for interoperability (DOD-enterprise
layer).
Component layer (Military departments and example defense agencies):
Army:
- Architectures;
- Transition plans;
- Systems solutions.
Navy:
- Architectures;
- Transition plans;
- Systems solutions.
Air Force:
- Architectures;
- Transition plans;
- Systems solutions.
Defense Logistics Agency:
- Architectures;
- Transition plans;
- Systems solutions.
Defense Finance and Accounting Service:
- Architectures;
- Transition plans;
- Systems solutions.
United States Transportation Command:
- Architectures;
- Transition plans;
- Systems solutions.
Program layer (example programs):
Army:
- General Fund Enterprise Business System;
- Logistics Modernization Program.
Navy:
- Navy Enterprise Resource Planning;
- Navy Tactical Command Support System.
Air Force:
- Expeditionary Combat Support System;
- Technical Training Management System.
Defense Logistics Agency:
- Business Systems Modernization;
- Distribution Planning Management System.
Defense Finance and Accounting Service:
- Automated Disbursing System;
- Defense Joint Military Pay System.
United States Transportation Command:
- Defense Enterprise Accounting and Management System;
- Defense Personal Property System.
Source: GAO analysis of DOD data.
[End of figure]
In September 2006, DOD issued its initial business mission area
federated strategy and road map, which we reported lacked adequately
defined tasks needed to achieve the strategy's goals, such as
addressing how strategy execution will be governed, component
architectures will be aligned with the latest version of the BEA, and
common applications and systems across the department will be
identified and reused. Accordingly, we reiterated our prior
recommendation for a BEA management plan, and recommended that DOD
ensure that this plan describes, at a minimum, how the business mission
area architecture federation would be governed; how the business
mission area federation strategy alignment with the DOD architecture
federation strategy would be achieved; how component business
architectures' alignment with incremental versions of the BEA would be
achieved; how shared services would be identified, exposed, and
subscribed to; and what milestones would be used to measure progress
and results.[Footnote 60]
In January 2008, DOD issued an updated strategy, and in May 2008, we
reported that the update, along with the associated global information
grid strategy,[Footnote 61] partially addressed our recommendations.
[Footnote 62] Specifically, we reported that the strategies provided
high-level roles and responsibilities for federating the architecture
and additional definition around the tasks needed to achieve alignment
among DOD and component architectures. We also noted that the strategy
for the business mission area provided for conducting pilot programs
across the components to demonstrate the technical feasibility of
architecture federation, and for using the lessons learned from the
pilots to improve and update the strategies.
To their credit, BTA and other DOD entities, such as ASD(NII)/DOD CIO
and the Department of the Army, are collaboratively taking steps to
establish the foundation for implementing the strategy. For example,
they have:
* selected the Department of the Army's Defense Knowledge Online to be
BTA's federated enterprise portal, which is to be the point of access
to information about all DOD and component architectures, and is to
allow users to search and navigate through this information;
* established and are using the DOD Architecture Registry System, which
is maintained by ASD(NII)/DOD CIO, as the repository to contain
architecture content;
* conducted five pilots at three military departments and two defense
agencies to evaluate various aspects of architecture federation and
develop lessons learned about, for example, approaches for capturing
and managing architecture metadata[Footnote 63] (Air Force pilot), and
enterprise search and discovery methods[Footnote 64] (Navy pilot); and:
* developed guidance on identifying and registering business services
and, as of November 2008, identified and registered 25 business
services, such as a service that provides detailed information on each
aircraft at the base (e.g., an aircraft's mission capability and
maintenance status), and a service that allows aircraft maintenance
data to be retrieved, created, updated, and removed.
According to officials from ASD(NII)/DOD CIO, which is responsible for
overall DOD architecture federation, the results of the pilots are
being used to determine future federation steps for all DOD mission
areas. In addition, BTA officials said that both BTA and ASD(NII)/DOD
CIO are defining a basic set of standard architecture models,[Footnote
65] including a common vocabulary for using architecture information
across DOD, to allow for uniform representation of architecture
content. Establishing such a common framework is important because
DOD's current lack of uniform representation for enterprise
architecture content, according to BTA and ASD(NII)/DOD CIO officials,
will limit the understanding and utility of the federated architecture.
Notwithstanding the above steps, BTA's strategy for federating the BEA
still does not contain sufficient detail to permit effective and
efficient execution and adequately address our recommendations. For
example, the business mission area's federation implementation road map
only outlines high-level, near-term milestones, such as milestones for
developing a governance charter for the DOD CIO Enterprise Guidance
Board, which is DOD's senior forum for guiding the development and
approval of enterprise-level guidance (including IT policy,
architecture, and standards) on enterprise architecture, and conducting
a pilot with Defense Knowledge Online to test an access control
mechanism.[Footnote 66] It does not, for example, specify tasks to be
performed to achieve those milestones, identify milestones or tasks
beyond fiscal year 2010, or identify resources needed to perform tasks
(e.g., funding, staffing, tools, and training). Further, the strategy
does not describe how the various architecture federation activities
taking place across DOD come together over time to achieve a federated
BEA, including measurement of progress, results, and the component
architectures' alignment with the latest version of the BEA. BTA and
ASD(NII)/DOD CIO officials stated that these details have yet to be
described because of unresolved issues surrounding the Deputy CMO and
military department CMO positions.
Moreover, DOD's federation efforts have yet to benefit from any
independent verification and validation (IV&V) assessments.[Footnote
67] As we previously reported, such assessments are important to ensure
the completeness, consistency, understandability, and usability of the
federated family of architectures.[Footnote 68] Accordingly, we
recommended that DOD have its BEA IV&V contractor perform such
assessments and disclose the results in its annual report to Congress.
However, DOD's March 2009 annual report does not include this
information. According to BTA officials, from October 2007 through
March 2009, BTA expended approximately $3 million on BEA-related IV&V
activities. However, these activities have focused on the corporate BEA
and not the entire federated family of architectures. BTA officials
also stated that future IV&V activities are not currently focused on
the federated family of architectures. They added that they are engaged
in discussions with ASD(NII)/DOD CIO on how and who to best perform
such assessments, given that the federated BEA is a part of DOD's
overall federated enterprise architecture, which is led by ASD(NII)/DOD
CIO.
The challenges that the department faces in federating its BEA, and the
importance of disclosing to congressional defense committees the state
of its federation efforts, are amplified by the current state of the
military departments' enterprise architecture programs. Specifically,
we recently reported that none of the three military departments could
demonstrate through verifiable documentation that it had established
all of the core foundational commitments and capabilities needed to
effectively manage the development, maintenance, and implementation of
an architecture,[Footnote 69] which are outlined in our Enterprise
Architecture Management Maturity Framework.[Footnote 70] While the Air
Force's architecture efforts are well ahead of those of the Navy and
Army, all three had yet to fully satisfy important aspects of our
framework. Examples of their architecture limitations are discussed
below:
* None of the military departments had fully defined its "as is" and
"to be" architecture environments and associated transition plans. This
is important because without a full understanding of architecture-based
capability gaps, the departments would not have an adequate basis for
defining and sequencing their ongoing and planned business system
investments.
* None of the military departments had fully addressed security as part
of its respective "as is" and "to be" environments. This is important
because security is relevant and essential to every aspect of an
organization's operations, and therefore the nature and substance of
institutionalized security requirements, controls, and standards should
be embedded throughout the architecture, and reflected in each system
investment.
* None of the military departments was using an IV&V agent to help
ensure the quality of its architecture products. IV&V is a proven means
for obtaining unbiased insight into such essential architecture
qualities as completeness, understandability, usability, and
consistency.
* None of the military departments could demonstrate that its IT
investments were actually in compliance with its architecture. This is
relevant because the benefits from using an architecture, such as
improved information sharing, increased consolidation, enhanced
productivity, and lower costs, cannot be fully realized unless
individual investments are actually in compliance with, among other
things, architectural rules and standards.
To address these limitations, we made recommendations aimed at
improving the management and content of these architectures. DOD agreed
with our recommendations. However, our recommendations have yet to be
fully implemented. Specifically, none of the military departments
provided documentation demonstrating that the above-cited limitations
have been addressed. Until DOD has a well-defined family of
architectures for its business mission area, it will not fully
implement the requirements of the Act and will remain challenged in its
ability to effectively manage its business system modernization
efforts.
DOD Continues to Update Its ETP, but Important Elements Are Still
Missing, as Are Individual Component Plans:
Among other things, the Act requires DOD to develop an ETP for
implementing its BEA that includes listings of the legacy systems that
will and will not be part of the target business systems environment
and specific time-phased milestones and performance metrics for each
business system investment.
On September 30, 2008, DOD released the latest version of its ETP,
[Footnote 71] which in general provides information on about 645
business systems, including, to varying degrees, the required
information on 54 systems that are linked to key transformational
objectives and priorities.[Footnote 72] For example, it includes
specific time-phased milestones with status indicators (e.g., met, on
track, or deleted) for about 47 out of the 54 systems, and it includes
performance metrics (e.g., voucher payment time and integration test
progress) for about 26 of these.[Footnote 73] Further, the latest
version of the ETP discusses progress made since March 2008 on business
system investments, as well as descriptions of planned near-term
activities (e.g., next 12 months). However, previously identified
limitations in the scope and completeness of the latest version of the
ETP remain. Examples of improvements and remaining issues are
summarized below.
* The ETP provides a range of information for some, but not all,
business system investments, such as 3 years of budget information for
about 342 out of 645 systems (about 50 percent), 46 of which are linked
to key transformation objectives and priorities. However, the ETP does
not yet include system and budget information for all the business
systems identified in the department's IT systems repository. According
to the ETP, it does not include budget information for about half of
the business systems identified because the budget data for some of
these systems were not included in the fiscal year 2009 budget
submission. Further, according to BTA officials, the ETP continues to
focus on tier 1 and 2 business systems. However, not all DOD components
have developed subordinate transition plans that would address all the
business system investments. For example, as we reported last year, the
Navy and Army have not yet developed subordinate transition plans.
[Footnote 74] More specifically, Navy officials stated that they are
revising their enterprise architecture development and governance
approach and, according to draft Navy enterprise architecture
documentation associated with this approach, an enterprise architecture
transition plan will be developed. Further, as we reported, the Air
Force's transition plan is limited. For example, it is not based on an
analysis of the gap in capabilities between the department's "as is"
and "to be" environments. Collectively, this means that a complete
family of DOD and component transition plans does not exist. According
to the BTA official responsible for the ETP, BTA and the military
departments are currently discussing whether component-level plans
should be published separately from or incorporated into the corporate
ETP. This is further complicated by the uncertainty surrounding how the
Deputy CMO will work with other senior leaders who have responsibility
for business operations, including the military department CMOs.
* The ETP continues to provide performance measures for some, but not
all, enterprise and component investments (i.e., programs), including
key milestones (e.g., initial operating capability) and status
indicators. However, the plan has yet to include other important
information needed to understand the sequencing of new systems becoming
operational and legacy systems being phased out. In particular, the
planned investments have not been sequenced based on a range of
important factors cited in federal guidance, such as technology
opportunities, marketplace trends, fiscal and budgetary constraints,
institutional system development and acquisition capabilities, new and
legacy system dependencies and life expectancies, and the projected
value of competing investments.[Footnote 75] Rather, the ETP continues
to be largely based on a bottom-up process in which ongoing programs
have been compiled and categorized in the plan around business
enterprise priorities. For example, many of these investments are
dependent on Net-Centric Enterprise Services, and as such the plans and
milestones for each should reflect the incremental capability
deployment of these enterprise services.[Footnote 76]
* The ETP and the business mission area federation strategy describe
the department's approach to enterprise application integration,
including plans for using specific services and standards for
integrating financial application systems.[Footnote 77] Including such
information in the ETP and associated documentation will help to
clarify relationships and dependencies among legacy applications and
systems and new or modernized applications and systems. However, all
systems needed to achieve integration are not specified. For example,
the ETP does not identify all of the systems that must be integrated
for each end-to-end business flow (e.g., budget-to-report) to support
activities that are cross-functional and cross-cutting across
organizational boundaries.
* The ETP does not include all legacy systems that will not be part of
the target BEA and does not provide the schedule for terminating these
legacy systems, as required by the Act. For example, while the Navy
Enterprise Resource Planning program's August 2008 investment review
board documentation identifies 41 legacy systems, the ETP identifies
only 25 of these systems.[Footnote 78] In addition, the plan is missing
information about some legacy systems and modernization programs.
Specifically, the plan does not include termination dates for 40 out of
514 legacy systems. Including a comprehensive and reliable list of
legacy systems is important for the department to have a meaningful and
reliable basis for managing the disposition of legacy systems and for
sequencing the introduction of modernized business operations and
supporting systems.
BTA officials said that a number of actions are envisioned to address
the above-cited areas and further improve the ETP, such as working with
the military departments and defense agencies to determine which
systems should be included in the corporate-level ETP and ensuring that
the next version of the ETP includes more information about
dependencies among systems. Until the ETP, or a federated family of
such plans, either directly or by reference includes relevant
information on the full inventory of investments across the department
(and does so in a manner that reflects consideration of the range of
variables associated with a well-defined transition plan, such as
timing dependencies among investments and the department's capability
to manage them), it will not provide a sufficient basis for sequencing
the introduction of modernized systems. To help DOD improve its ETP, we
have previously made recommendations that the department is in the
process of addressing aimed at formalizing its plans for incrementally
improving its transition plan.
Fiscal Year 2009 Budget Submission Did Not Include Key Information on
All Business Systems:
Another requirement of the Act is that DOD's annual IT budget
submission must include key information on each business system for
which funding is being requested, such as the system's designated
approval authority and the appropriation type and amount of funds
associated with development/modernization and current services (i.e.,
operation and maintenance).
As we reported last year, the department's fiscal year 2009 budget
submission included a range of information required by the Act on
business system investments.[Footnote 79] Specifically, for 273
investments that involve development/modernization activities, the
submission included such information as the system's (1) name, (2)
approval authority, and (3) appropriation type. The submission also
identified the amount of the fiscal year 2009 request that was for
development/modernization versus operations/maintenance. Further, for
those system investments in excess of $1 million in modernization
funding, the submission cited the certification status (e.g., approved,
approved with conditions, not applicable, and withdrawing) and the
DBSMC approval date, where applicable.
However, the fiscal year 2009 budget submission does not reflect all
business system investments. To prepare the submission, DOD relied on
business system investment information (e.g., funds requested, mission
area, and system description) that is entered by the components into
DOD's Select and Native Programming Data Input System-Information
Technology (SNAP-IT). In accordance with DOD guidance and according to
ASD(NII)/DOD CIO officials, the business systems listed in SNAP-IT
should match the systems listed in the Defense Information Technology
Portfolio Repository (DITPR)--the department's authoritative business
systems inventory. However, the number of business systems in DITPR is
unclear. Specifically, in March 2009, DITPR data provided by DOD
included about 6,800 systems, and in April 2009, BTA officials stated
that the number of operational business systems in the repository was
2,480, adding that the 6,800 number included systems that were not
business systems and systems that may no longer be operational.
However, they have yet to provide support for this revised number of
business systems.
Regardless, SNAP-IT is potentially missing thousands of business
systems that are identified in DITPR. Specifically, SNAP-IT contains
about 2,100 systems, of which only about 1,500 are categorized as
business systems.[Footnote 80] Restated, the fiscal year 2009 budget
submission is missing somewhere between 980 and 5,300 business systems.
For example, the Department of the Navy's Personnel Information System
for Training, Operations, and Logistics and the Air Force's Contractor
Responsibility Information System are listed in DITPR but not listed in
SNAP-IT. Moreover, as stated earlier in the report, DOD has also
recognized limitations in its budget submission in its ETP. The
ASD(NII)/DOD CIO official responsible for administering the SNAP-IT
data said that while the components are responsible for ensuring that
information about their respective systems is accurate and complete,
the department recognizes the need to reconcile the information between
SNAP-IT and DITPR to improve the systems' comprehensiveness and
accuracy. However, the department has yet to develop a plan or time
frame for doing so. Without a reliable comprehensive inventory of all
defense business systems, DOD will not be able to ensure the
completeness and reliability of its IT budget submissions.
DOD Has Made Progress in Establishing Corporate and Component
Investment Management Structures, but Associated Policies and
Procedures Are Not Yet Fully Defined and Implemented:
The Act also requires DOD to establish business system investment
review structures, such as the previously discussed DBSMC and five
IRBs, as well as processes that are consistent with the investment
management provisions of the Clinger-Cohen Act.[Footnote 81] As we have
previously reported, organizations that satisfy Stages 2 and 3 of our
ITIM framework have the investment selection, control, and evaluation
structures, and the related policies, procedures, and practices that
are consistent with the investment management provisions of the Clinger-
Cohen Act.
DOD and the Air Force have largely established the kind of investment
management structures provided for in the Act and our ITIM framework.
[Footnote 82] However, the Navy has not. Moreover, neither DOD nor
these components have defined the full range of related investment
management policies and procedures that our framework identifies as
necessary to effectively manage investments as individual business
system programs (Stage 2) and as portfolios of programs (Stage 3).
Until all of DOD has put these requisite investment management
structures and supporting policies and procedures into place, the
billions of dollars that the department and its components invest
annually in business systems will remain at risk.
Corporate and Air Force Investment Management Structures Are Largely
Established, but Navy Structures Remain a Work in Progress:
DOD has largely established corporate-level organizational structures
that are associated with Stages 2 and 3 of our framework. As we
reported in May 2008, the department has an enterprisewide investment
board and four subordinate boards, and has assigned them responsibility
for business systems investment governance, including conducting
investment certification and approval reviews and annual reviews as
provided for in the Act.[Footnote 83] The enterprisewide board--the
DBSMC--is composed of the department's top executives, such as the
Deputy Secretary of Defense and the ASD(NII)/DOD CIO, as provided for
in the Act. Among other things, the DBSMC is responsible for
establishing and implementing policies governing the organization's
investment process and approving lower-level investment board processes
and procedures. The subordinate boards include four IRBs that are
composed of senior officials representing their respective business
areas, including representatives from the combatant commands, defense
agencies, military departments, and Joint Chiefs of Staff.[Footnote 84]
Among other things, the IRBs are responsible and accountable for
overseeing and controlling certain business system investments,
including ensuring compliance and consistency with the BEA. The
department has also assigned responsibility to the Under Secretary of
Defense for Acquisition, Technology, and Logistics for managing
business system portfolio selection criteria.
Since 2008, the department has taken additional steps to establish a
fifth IRB, the DOD Chief Information Officer's review board, which is
to oversee investments in business systems whose primary purpose is to
support infrastructure and information assurance activities. According
to DOD officials, this board is to replace the Enterprise Information
Environment Mission Area review board, which was the fifth board
required by the Act, and its charter has been drafted, but not
approved.[Footnote 85]
With respect to the military departments' investment management
structures, we reported in May 2008 that the Air Force had established
the organizational structures associated with Stages 2 and 3 of our
framework, such as a business systems IRB consisting of senior
executives from the functional business units, including the Office of
the Air Force CIO.[Footnote 86] Among other things, this board is
responsible for business system investment governance, including
conducting investment precertification, approval, and annual reviews,
as required by the Act.
We recently reported that, in contrast to the Air Force, the Navy had
not yet established an enterprisewide IRB composed of senior executives
from its IT and business units, to define and implement a Navy-wide
business system governance process.[Footnote 87] We concluded that
without such structures, the Navy's ability to ensure that business
system investment decisions are made consistently and reflect the needs
of the organization was limited. Accordingly, we recommended that the
Navy establish these management structures. Navy officials told us that
a Secretary of the Navy Instruction that is intended to address these
limitations has been drafted but not yet approved.[Footnote 88]
Corporate and Air Force Investment Management Policies and Procedures
Are Being Established, but Navy's Remain Largely Undefined:
DOD has partially defined the full range of corporate and component-
level policies and procedures that we previously recommended it
establish to effectively support project-level (Stage 2) and portfolio-
based (Stage 3) investment management practices.[Footnote 89]
Specifically, DOD recently issued new corporate-level policies and
procedures that further address key practices in our ITIM framework
associated with project-level investment management (Stage 2), such as
instituting the investment board and providing investment oversight. In
particular, DOD's revised 2008 acquisition policy[Footnote 90] and
draft business capability life cycle acquisition policy and guidance
outline aspects of how the business investment review processes are to
be coordinated with other decision-support processes used at DOD, such
as the Joint Capabilities Integration and Development System and the
Defense Acquisition System.[Footnote 91] For example, the revised
policies and guidance now require a team to assess the risks associated
with each Major Automated Information System and to share the results
with the program manager and component functional sponsor,[Footnote 92]
who in turn are to collaboratively report the risks to both the IRB and
the program's milestone decision authority prior to each milestone
decision.[Footnote 93] They further require the DBSMC to approve the
obligation of funds prior to the first milestone review of each major
business system. In addition, DOD also recently revised its policy for
overseeing the acquisition of systems that provide joint capabilities,
to require all business system investments to comply with the business
system investment review process and the business capability life cycle
process.[Footnote 94]
The department has also recently established guidance associated with
portfolio-level investment management (Stage 3) practices. However,
DOD's updated corporate-level policies and procedures are still missing
critical project-and portfolio-based investment management practices
that we previously recommended, as discussed below.[Footnote 95]
* Policies and procedures for instituting the investment board do not
address how all investments that are past the development/modernization
stage (i.e., in operations and maintenance) are to be governed. Given
that DOD invests billions of dollars annually in operating and
maintaining business systems, this is significant. For example, while
the 2009 update to the IRB guidance now requires an annual review of
all investments previously certified by IRBs, including those in
operations and maintenance, this review is not required for systems in
operations and maintenance that were not previously certified by the
IRBs. Our ITIM framework emphasizes that the corporate investment
boards should review important information about an investment, such as
cost and performance baselines, throughout the investment's life cycle.
In addition, while the department's investment process addresses how
investment-related processes are to be coordinated with the Joint
Capabilities Integration and Development System and the Defense
Acquisition System, these processes do not apply to all business
systems. For example, DOD's updated acquisition policy states that IRB
involvement in acquisition decisions is required only for Major
Automated Information Systems. Moreover, the 2008 acquisition policy
and draft business capability life cycle acquisition policy and
guidance do not address how these processes are to be coordinated with
the Planning, Programming, Budgeting, and Execution process.[Footnote
96] Furthermore, the business capability life cycle acquisition policy
and guidance has yet to be approved. Without approved policies and
procedures that provide clear visibility into all investments,
including linkages to related management systems, inconsistent
investment decisions may result.
* Procedures for selecting an investment do not specify how the IRBs
use the full range of cost, schedule, and benefit data in making
selection (i.e., certification) decisions. Specifically, while the
revised 2009 IRB guidance states that the IRBs will consider cost,
schedule, and benefit data in making certification decisions, the
guidance does not define how the boards are to consider these factors.
According to our ITIM guidance, a structured selection method should
provide investment boards, business units, and IT developers with a
common understanding of the selection process to be followed, including
how cost, schedule, and benefit data are to be used to compare and
select projects. Furthermore, while DOD issued an IRB roles and
responsibilities policy in January 2009 that states that the
certification authorities will define the selection criteria for
determining whether an investment is to be an enterprisewide system or
remain component specific,[Footnote 97] those certification authorities
have yet to do so.[Footnote 98] Without documenting how the IRBs employ
such factors when making selection decisions, the department cannot
ensure that the boards consistently and objectively select proposals
that best meet the department's needs and priorities.
* Policies and procedures for overseeing an investment do not provide
for sufficient visibility into component-level investment management
activities, including component reviews of systems in operations and
maintenance and smaller investments, commonly referred to as tier 4
investments. Such visibility is important because DOD reports that only
346 system modernization efforts have been IRB certified and DBSMC
approved. This means that the vast majority of business systems are
reviewed and approved only within the component organizations. While
the January 2009 IRB roles and responsibilities policy requires that
each component submit an end-of-the-fiscal-year report listing those
systems that have been reviewed by the cognizant IRB, this report lacks
important project information. For example, it does not address
components' adherence to cost, schedule, and risk investment selection
and control criteria. According to our ITIM framework, an investment
board should have visibility into each project's performance and
progress toward predefined cost, schedule, and benefit expectations as
well as each project's exposure to risk. Without such visibility, DOD
components risk making investment decisions that are inconsistent and
not fully grounded in objective data.
* Policies and procedures have not been fully established for defining
the portfolio selection criteria or for creating and evaluating the
portfolio of business systems. Specifically, the department has
assigned responsibility to its certification authorities for defining
the criteria to be used for making portfolio selection decisions,
creating portfolios, and evaluating the performance of portfolio
investments. However, these authorities have yet to fulfill these
responsibilities.
According to our ITIM framework, the development and use of portfolio
selection criteria focuses on the synergistic benefits to be found
among an agency's entire collection of investments, rather than just
from the sum of the individual investments.
* Policies and procedures for conducting postimplementation reviews do
not address all business systems. Specifically, in its January 2009
update to its IRB guidance, the department added a new type of review,
called a closeout annual review, to be performed when a business system
modernization has been completed. According to the guidance, this
review is to function as a postimplementation review for IRB-certified
systems and is to provide the IRBs with lessons learned and metrics
about completed investment efforts. However, the guidance does not
address how expected benefits were achieved. According to our ITIM
framework, examining the differences between estimated and actual
investment costs and benefits is a key aspect of conducting
postimplementation reviews.
According to BTA officials, these limitations are due to the newness of
its investment review policies and procedures, which they said will be
revised over time to address the limitations. Adequately documenting
both the policies and the associated procedures that provide
predictable, repeatable, and reliable investment selection and that
control and govern how an organization manages its IT investment
portfolios reduces investment risk of failure and provides the basis
for rigor, discipline, and repeatability in how investments are
selected and controlled across the entire organization.
With respect to the military departments' investment management
policies and procedures, we recently reported that the Air Force and
the Navy did not have fully documented policies and procedures for
overseeing the management of business system investments and for
developing and managing complete business systems investment
portfolios.[Footnote 99] To address these areas, we made
recommendations aimed at implementing our framework's Stage 2 and 3
practices, and DOD partially agreed with these recommendations. Under
DOD's tiered accountability approach to reviewing and approving
business systems investments, in which investment review begins at the
component level and proceeds through a hierarchy of review and approval
authorities, depending on the size and significance of the investment,
it is vital that DOD components implement these practices. BTA
officials told us that the success of the department's overall process
for managing business system investments depends on each component
performing a thorough analysis and making informed decisions relative
to each business system before it is submitted for higher-level review
and approval.
To the Air Force's credit, it has recently updated its policies and
procedures to address our project-level investment management
recommendations (Stage 2 of our framework).[Footnote 100] For example,
the Air Force's recently developed IT investment review guidance
provides for the review of all business systems, to include those in
operations and maintenance, and it defines the process by which its IRB
will review these systems. Further, the guidance specifies how business
investments, including those in operations and maintenance, are to be
prioritized using factors such as mission and strategic value and risk.
The Air Force has also addressed key practices associated with
portfolio-level investment management (Stage 3), such as creating and
modifying IT portfolio selection criteria and assigning responsibility
for the development and modification of IT portfolio selection
criteria. Specifically, the guidance describes the criteria to be used
to make portfolio selection, assigns responsibility for developing the
criteria to an integrated working team, and assigns responsibility for
approval of the criteria to a senior working group.
However, the Air Force's recent investment review guidance is still
missing critical elements needed to effectively carry out essential
investment management activities. For example, the guidance does not
yet specify how the business investment management activities are
coordinated with other DOD management systems, such as the Joint
Capabilities Integration and Development System, the Defense
Acquisition System, and the Planning, Programming, Budgeting, and
Execution process. Further, the guidance does not provide for
sufficient oversight and visibility into investment management
activities. Specifically, while the Air Force has predefined criteria
for adherence to cost, schedule, and performance milestones, and
requires the development of corrective actions when a system deviates
from milestones, it does not have policies and procedures that guide
the implementation of these corrective actions when program
expectations are not met. Moreover, the Air Force has yet to develop
policies and procedures for maintaining investment portfolios.
According to the Air Force, such key practices will be addressed in
future revisions to its guidance.
In contrast, the Navy has not made as much progress as the Air Force in
addressing either our project-level or portfolio-level recommendations.
For example, the Navy has yet to fully document policies and procedures
for overseeing the management of business system investments and for
developing and managing complete business systems investment
portfolios. Among other things, it does not have policies and
procedures that specify decision-making processes for program oversight
and describe how corrective actions should be taken when projects
deviate from their project management plans. According to the Navy, a
policy for addressing our recommendations has been drafted, but has yet
to be approved.
As discussed in our ITIM framework, adequately documenting both the
policies and associated procedures that govern how an organization
manages its IT projects and investment portfolios is important because
doing so provides the basis for rigor, discipline, and repeatability in
how investments are selected and controlled across the entire
organization. Until these missing policies and procedures are fully
defined at both the corporate and the component levels, it is unlikely
that the thousands of DOD business system investments will be managed
in a consistent, repeatable, and effective manner.
DOD Continues to Certify and Approve Business Systems, but Decisions
Are Sometimes Based on Limited Information:
The Act specifies two basic requirements that took effect October 1,
2005, relative to DOD's use of funds for business system modernization
investments that involve more than $1 million in obligations. First, it
requires that these investments be certified by a designated approval
authority[Footnote 101] as meeting specific criteria, such as
demonstrating compliance with the BEA.[Footnote 102] Second, it
requires that the DBSMC approve each of these certifications, adding
that failure to do so before the obligation of funds for any such
investment constitutes a violation of the Anti-deficiency Act.[Footnote
103] In addition, DOD's business system approval and certification
guidance directs programs to submit additional information, such as a
program's economic analysis, to designated approval authorities.
As it has since 2005, DOD continues to certify and approve business
system modernization investments in excess of $1 million. However,
since 2006, we have identified limitations in the information used to
certify and to approve several major programs.[Footnote 104] Moreover,
although IRB certification and annual review guidance calls for DOD's
authoritative business systems repository (i.e., DITPR) to be used to
inform business system investment certification and annual review
decisions, information in this repository is not always current and
accurate. As a result, DOD risks making certification and approval
decisions that are not prudent and justified.
DOD Has Continued to Certify and Approve Business Modernizations in
Excess of $1 Million:
The department has established an approach to meeting the Act's
requirements that reflects its philosophy of tiered accountability.
Under this approach, investment review begins within the military
departments and defense agencies and advances through a hierarchy of
review and decision-making authorities, depending on the size, nature,
and significance of the investment. For those investments that meet the
Act's dollar thresholds, this sequence of review and decision making
includes component precertification, IRB certification, and DBMSC
approval. For those investments that do not, investment decision-making
authority remains with the component. This review and decision-making
approach has two types of reviews for business systems: certification/
approval reviews and annual reviews.
Certification/approval reviews. Certification/approval reviews apply to
new modernization investments with planned obligations in excess of $1
million. These reviews focus on program alignment with the BEA and must
be completed before components obligate modernization funds. Tier 1, 2,
and 3 investments that involve development and modernization funds are
certified and approved at three levels--component precertification, IRB
certification, and DBSMC approval.
At the component level, program managers are responsible for the
information about their respective programs that is in DITPR. Examples
of information contained in DITPR are regulatory compliance reports,
architectural profiles, financial benefit information (i.e., benefit-
to-cost ratio), and system life cycle costs. According to the process,
the component precertification authority is responsible for
precertifying BEA compliance and reviewing system modernization funding
requests, in addition to ensuring that IRBs receive complete, current,
and accurate information within the prescribed deadlines. The
precertification authority asserts the status and validity of the
investment information by submitting a component precertification
letter to the appropriate IRB.
At the corporate level, the IRB reviews the precertification letter and
related material, and if it decides to certify the investment, prepares
a certification memorandum for the designated certification authority's
signature that documents the IRB's decisions and any related
conditions. The memorandum is forwarded to the DBSMC, which either
approves or disapproves the IRB's decisions and issues a memorandum
containing its decisions. If the DBSMC disapproves a system
investment's certification, it is up to the component precertification
authority to decide whether to resubmit the investment after it has
resolved the relevant issues.
Annual reviews. The annual reviews apply to all business system
investments and are intended to determine whether the investment is
continuing to comply with the BEA, meeting its milestones, and
addressing its IRB certification conditions. Tier 1, 2, and 3 business
system investments are annually reviewed by the relevant component and
IRB.
At the component level, program managers update information on all
tiers of system investments that are identified in their component's
data repository. For Tier 1, 2, or 3 systems that are in development or
being modernized, information is updated on cost, milestones, and risk
variances and actions or issues related to certification conditions.
The component precertification authority then verifies and submits the
information for these investments to the appropriate IRB in an annual
memo.
At the IRB level, Tier 1, 2, and 3 business system development or
modernization investment reviews focus on program compliance with the
BEA, program cost and performance milestones, and progress in meeting
certification conditions. IRBs can advise the DBSMC to revoke a
certification when the investment has significantly failed to achieve
performance commitments (i.e., capabilities, schedule, and costs). When
this occurs, the component must address the IRB's concerns and resubmit
the investment for certification.
Since October 1, 2005 (the effective date of the relevant provision of
the Act), DOD has continued to certify and approve investments with
obligations in excess of $1 million. Since fiscal year 2005, DOD has
reported that the DBSMC had approved system modernization efforts for a
total of 346 systems. According to DOD:
* All but one of the 346 system modernization efforts were certified
and approved as meeting the first condition in the Act--being in
compliance with the BEA.[Footnote 105] These systems involved about
$8.5 billion in development/modernization funding.
* About 60 percent of the 346 system modernization efforts (208) are
owned by the military departments and were accordingly precertified
within the military departments. More specifically, 63 were
precertified within the Air Force, 79 within the Army, and 66 within
the Navy.
DOD Certification and Approval Decisions Have Been Based on Limited
Information:
Although DOD has been meeting the Act's requirement to certify and
approve business system modernization programs, it has at times relied
on limited information in doing so. For example, we recently reported
that two large Navy business system programs did not adequately
demonstrate compliance with the department's federated BEA, even though
each program largely followed DOD's existing compliance guidance, used
its compliance assessment tool, and was certified and approved as being
compliant by department investment oversight and decision-making
entities.[Footnote 106] In particular, these programs' BEA compliance
assessments did not (1) include all relevant architecture products,
such as products that specify the technical standards needed to promote
interoperability among related systems; (2) examine overlaps with other
business systems, even though a stated goal of the BEA is to identify
duplication and thereby promote the use of shared services; and (3)
address compliance with the Department of the Navy's enterprise
architecture, which is a major BEA federation member. We attributed
these limitations to various reasons, including the fact that the
department's guidance did not provide for performing these steps.
In addition, we reported that although the department's investment
oversight and decision-making authorities certified and approved these
business system programs as compliant with the BEA, they did not
validate each program's compliance assessment and assertions. According
to DOD officials, this was because responsibility for doing so is
assigned to DOD's component organizations, such as the Department of
the Navy, under the department's tiered accountability approach.
However, the Department of the Navy oversight and decision-making
authorities also did not validate the programs' assessments and
assertions. We concluded that such architecture compliance limitations
increase the risk of DOD programs being defined and implemented in a
way that does not sufficiently ensure interoperability and avoid
duplication and overlap. Accordingly, we made a number of
recommendations to address these limitations, which the department
agreed to implement.
Another example of limited information used to certify and approve
business system investments is the unreliable economic justifications
for the programs. According to relevant DOD guidance, the economic
viability of system investments is to be analyzed on the basis of
reliable estimates of costs and benefits. However, we have continued to
report on limitations in the cost/benefit analyses used to economically
justify major DOD business system investments.[Footnote 107] More
recently, we reported that the Global Combat Support System-Marine
Corps cost estimate was not reliable, as it was not based on historical
data from similar programs and it did not account for schedule risks,
both of which are needed for the estimate to be considered accurate and
credible.[Footnote 108] In addition, we reported that the Navy
Enterprise Resource Planning program did not employ similar cost-
estimating practices.[Footnote 109] As a result, we concluded that
neither program had a sufficient basis for deciding if it was the most
cost-effective solution for meeting mission needs, and we made
recommendations to address these weaknesses. DOD agreed with our
recommendations.
Accurate Information about Modernization Investments Is Not Maintained
in DOD's IT System Repository:
Since 2005, DITPR has been designated as the authoritative repository
of information about all DOD business systems. According to DOD's
business system certification and annual review guidance, information
in DITPR is to be updated by component staff, validated by program
managers, and reviewed by component precertification authorities to
ensure its accuracy, and it is to be used by the IRBs and the DBSMC in
making certification and approval decisions, respectively.
The information in DITPR is not always accurate, and thus does not
always provide an adequate basis for informed decision making.
According to ASD(NII)/DOD CIO officials, information entered in DITPR
at the component level is not always reliable and validated. Our
analysis of selected business system information contained in DITPR
confirmed such inaccuracies:
* At least 900 systems, such as the Contractor Performance Assessment
Reporting System[Footnote 110] and the Air Force's Virtual Personnel
Service Center,[Footnote 111] showed life cycle phase start dates as
the year 1900 or 1901.
* At least 960 systems, such as the Armed Forces Health Longitudinal
Technology Application[Footnote 112] and BTA's Wide Area Workflow
System,[Footnote 113] show a life cycle phase end date of 2099 or
later.
Moreover, as stated earlier in this report, DOD provided inconsistent
information about the number of business systems contained in DITPR.
Specifically, in March 2009, DITPR data provided by DOD included about
6,800 systems, and in April 2009 BTA officials stated that the number
of operational business systems in the repository was 2,480.[Footnote
114] Thus, the number of business systems in DITPR is also unclear.
According to ASD(NII)/DOD CIO officials, a policy is being developed to
have the DOD Inspector General periodically validate the accuracy of
the information in DITPR. Given that the information from DITPR is used
to make certification and approval decisions, serious limitations in
the accuracy of information could affect the quality of the decisions.
Conclusions:
The pace of DOD's progress in defining and implementing key
institutional modernization management controls has slowed relative to
each of the prior 4 years, leaving much to be accomplished.
Specifically, the corporate BEA continues to be missing important
content, and it has yet to be federated through development of aligned
subordinate architectures for each of the department's component
organizations. Further, while the department has updated its strategy
for federating the BEA, this strategy is still missing important
content and it has yet to be implemented. Compounding this situation
are recurring limitations in the scope and completeness of the
department's enterprise transition plan, as well as the immaturity of
the military department architecture programs, including the
completeness of their own transition plans. In addition, the corporate
and the military departments' approaches to business systems investment
management continue to lack the requisite structures and defined
policies and procedures to be considered effective investment
selection, control, and evaluation mechanisms. Finally, information
used to support the development of the transition plan and DOD's budget
requests, as well as to inform certification and annual reviews, is of
questionable reliability. Collectively, these long-standing limitations
in the department's institutional modernization management controls
continue to put billions of dollars spent each year on thousands of
business system investments at risk.
A well-defined federated architecture and accompanying transition plans
for the business mission area, along with well-defined investment
management policies and procedures across all levels of the department,
are critical to effectively addressing DOD's business systems
modernization high-risk area. Relatedly, it is important for the
department to obtain independent assessments of the completeness,
consistency, understandability, and usability of the federated family
of business mission area architectures, including associated transition
plans, and to share the results of these assessments with its
authorizing and appropriations committees. Equally important is for the
department to actually implement its architecture and investment
management controls in the years ahead on each and every business
system investment, and in doing so to ensure that it has reliable
information on each investment upon which to base executive decision
making.
Our previous recommendations to the department have been aimed at
accomplishing these and other important activities related to its
business systems modernization. While not a guarantee, having an
architecture-centric investment management approach, combined with the
actual implementation of other key system acquisition disciplines that
are reflected in our existing recommendations, can provide a recipe for
the business systems modernization program's removal from our high-risk
list. To the department's credit, it has agreed with these
recommendations and committed to implementing them. Moreover, over the
previous several years, it has made important progress in doing so, as
prior reports have recognized. However, the pace of the progress has
slowed over the last year as the roles, responsibilities, authorities,
and relationships among recently established executive positions that
are integral to defining and implementing these controls are worked
out. In light of this, it is essential that the DBSMC, which is chaired
by the DOD CMO, resolve these positional matters, as doing so is on the
department's critical path for fully establishing the full range of
institutional management controls needed to address its business
systems modernization high-risk area.
Recommendations for Executive Action:
Because we have existing recommendations that address most of the
institutional management control weaknesses discussed in this report,
we reiterate these recommendations.
In addition, to ensure that DOD continues to implement the full range
of institutional management controls needed to address its business
systems modernization high-risk area, we recommend that the Secretary
of Defense direct the Deputy Secretary of Defense, as chair of the
DBSMC and as DOD's CMO, to resolve the issues surrounding the roles,
responsibilities, authorities, and relationships of the Deputy CMO and
the military department CMOs relative to the BEA and ETP federation and
business system investment management.
Further, to ensure that business system investment reviews and related
certification and approval decisions, as well as annual budget
submissions, are based on complete and accurate information, we
recommend that the Secretary of Defense direct the appropriate DOD
organizations to develop and implement plans for reconciling and
validating the completeness and reliability of information in its DITPR
and SNAP-IT system data repositories, and to include information on the
status of these efforts in the department's fiscal year 2010 report in
response to the Act.
Agency Comments and Our Evaluation:
In written comments on a draft of this report, signed by the Assistant
Deputy Chief Management Officer and reprinted in appendix II, the
department stated that it has made important progress over the past
year on its business system modernization, adding that this progress
partly addresses our prior recommendations. We agree that the
department has continued to make progress, and our report recognizes
this. However, our report also recognizes that the pace of this
progress has slowed in relation to prior years, and it links this
slowdown to implementation of recent management structural changes
within the department, which DOD's comments acknowledge have had to
occur simultaneously.
To facilitate implementation of these structural changes, we
recommended that DOD resolve the issues surrounding the roles,
responsibilities, authorities, and relationships of the Deputy CMO and
the military department CMOs relative to the BEA and ETP federation and
business system investment management. DOD partially agreed with this
recommendation. In particular, the department agreed that additional
clarity would be useful in defining the roles and responsibilities of
these positions and stated that it is committed to resolving this
ambiguity through formal policy in the near future. However, the
department stated that it believes that the Deputy CMO has the
necessary authority, working on behalf of the Deputy Secretary of
Defense, and that the Deputy CMO has a sufficiently close working
relationship with the Deputy CMOs of the military departments to make
significant strides in the department's business operations improvement
efforts, even in the absence of near-term formal guidance. We do not
agree. As we have previously reported, the department has designated
the role of the Deputy CMO as an advisor to the CMO, and it has not
assigned the Deputy CMO clear decision-making authority.[Footnote 115]
Further, the absence of clarity around the Deputy CMO's role and
responsibilities, which DOD acknowledged in its comments, combined with
this absence of clear decision-making authority, directly affects the
nature of the Deputy CMO's relationship with other senior leaders in
the department, as relationships are a function of roles,
responsibilities, and authorities. Therefore, we stand by our
recommendation.
With regard to our second recommendation, to develop and implement
plans for reconciling and validating the completeness and reliability
of information in its DITPR and SNAP-IT data repositories, and to
include information on the status of these efforts in the department's
fiscal year 2010 report in response to the Act, DOD stated that it
partially agreed with the recommendation. In particular, it agreed with
the need to reconcile information between the two repositories and
stated that it has begun to take actions to address this. For example,
it stated that policy and guidance now require the components to enter
information in both DITPR and SNAP-IT using what it described as a "one-
to-one" relationship for all defense business systems, and that the DOD
CIO is working with the components to facilitate implementation of this
requirement. In addition, it stated that the DOD CIO and Office of
Program Analysis and Evaluation are currently developing a plan to
modify both DITPR and SNAP-IT to eliminate duplicate data and integrate
them.
Notwithstanding its actions aimed at reconciling DITPR and SNAP-IT
data, DOD commented that it disagreed that the data in the two
repositories are unreliable, stating that differences in the data
between the two are due to differences in the purpose of each
repository, and that the data in each are complete and accurate enough
to support their purposes. In response, we recognize that the
repositories are used for different purposes. However, DOD guidance
calls for business system information in the two repositories to be
consistent and maintained at the same level of detail, which, as we
state in our report, is not occurring. In particular, the number of
business systems in DITPR and SNAP-IT is not consistent, which means
that one or both lack important information about DOD business systems.
As also stated in our report, system-specific information contained in
DITPR is not accurate. For example, at least 900 systems showed life
cycle phase start dates as the year 1900 or 1901, and at least 960
systems show a life cycle phase end date of 2099 or later. In addition,
during the course of our review, DOD officials that we interviewed and
who operate these repositories recognized these data limitations and
agreed that more needed to be done to ensure data reliability.
DOD also provided technical comments on a draft of this report that we
have incorporated throughout the report, as appropriate.
We are sending copies of this report to interested congressional
committees; the Director, Office of Management and Budget; and the
Secretary of Defense. This report will also be available at no charge
on our Web site at [hyperlink, http://www.gao.gov].
If you or your staffs have any questions on matters discussed in this
report, please contact me at (202) 512-3439 or hiter@gao.gov. Contact
points for our Offices of Congressional Relations and Public Affairs
may be found on the last page of this report. GAO staff who made major
contributions to this report are listed in appendix III.
Signed by:
Randolph C. Hite:
Director:
Information Technology Architecture and Systems Issues:
List of Committees:
The Honorable Carl Levin:
Chairman:
The Honorable John McCain:
Ranking Member:
Committee on Armed Services:
United States Senate:
The Honorable Daniel Inouye:
Chairman:
The Honorable Thad Cochran:
Ranking Member:
Committee on Appropriations:
Subcommittee on Defense:
United States Senate:
The Honorable Ike Skelton:
Chairman:
The Honorable John M. McHugh:
Ranking Member:
Committee on Armed Services:
House of Representatives:
The Honorable John P. Murtha:
Chairman:
The Honorable C.W. Bill Young:
Ranking Member:
Committee on Appropriations:
Subcommittee on Defense:
House of Representatives:
[End of section]
Appendix I: Objective, Scope, and Methodology:
As agreed with defense congressional committees, our objective was to
assess the Department of Defense's (DOD) actions to comply with the
requirements of section 2222 of Title 10, U.S. Code.[Footnote 116] To
address this, we used our last annual report under the Act as a
baseline,[Footnote 117] analyzing whether the department had taken
actions to comply with five of the six requirements in section 2222,
related best practices contained in federal guidance, and our prior
recommendations that we previously identified as not yet addressed.
Generally, these five requirements are (1) development of a business
enterprise architecture (BEA), (2) development of an enterprise
transition plan (ETP) for implementing the BEA, (3) inclusion of
business systems information in DOD's budget submission, (4)
establishment of business systems investment review processes and
structures, and (5) approval of defense business systems investments
with obligations in excess of $1 million. (See the background section
of this report for additional information on the Act's requirements.)
We did not include the sixth requirement, on delegating the
responsibility for business systems to designated approval authorities,
because our November 2005 report under the Act shows that it had been
satisfied.[Footnote 118] Our methodology relative to each of the five
requirements is as follows:
* To determine whether the BEA addressed the requirements specified in
the Act and related guidance, we analyzed version 6.0 of the BEA, which
was released on March 13, 2009, relative to the Act's specific
architectural requirements and related guidance that our last annual
report under the Act identified as not being fully implemented.
Specifically, we interviewed Business Transformation Agency (BTA)
officials and reviewed written responses and related documentation on
steps completed, under way, or planned to address these weaknesses. We
then reviewed architectural artifacts in version 6.0 to validate the
responses and identify any discrepancies. Further, we analyzed BEA
supporting documentation (e.g., BEA compare reports) to determine the
number of additions, updates, and deletions made to BEA artifacts
(e.g., BEA business rules, data elements, data objects, data entities,
information exchanges, system data exchanges, system entities, system
functions, system interfaces, and technical standards) as compared with
the architectural content of version 5.0. We also analyzed BEA
supporting documentation to identify the number of additions, updates,
and deletions made to BEA artifacts (e.g., BEA business rules, data
objects, system data exchanges, system entities, and system functions)
that were specifically associated with the financial visibility
business enterprise priority area.
To evaluate progress made in federating DOD's BEA, we reviewed DOD's
Business Mission Area Architecture Federation Strategy and Roadmap
Version 2.4, released in January 2008, comparing the strategy and any
associated implementation plans with prior findings and recommendations
relative to the content of the strategy. We also obtained documentation
and interviewed cognizant DOD officials about efforts to establish a
federated DOD business mission area enterprise architecture. Further,
we reviewed the military departments' responses on actions taken or
planned to address our previous recommendations on the maturity of
their respective enterprise architecture programs.[Footnote 119] In
addition, we reviewed the independent verification and validation
(IV&V) contractor's statement of work and IV&V reports to determine
whether they addressed the quality of the department's federated family
of corporate and component architectures, including the federated ETPs,
and we interviewed the IV&V contractor and BTA officials to determine
plans for future IV&V work to address the architectures' quality.
* To determine whether the DOD ETP addressed the requirements specified
in the Act, we reviewed the updated version of the ETP, which was
released on September 15, 2008, relative to the Act's requirements and
related transition plan guidance that our last annual report under the
Act identified as not being fully implemented.[Footnote 120]
Specifically, we interviewed BTA officials and reviewed written
responses and related documentation on steps completed, under way, or
planned to address these weaknesses. We then reviewed the plan to
validate the responses and identify any discrepancies. In addition, to
determine the extent to which the ETP included system and budget
information for all the business systems identified in the department's
information technology (IT) systems repository, we reviewed and
compared the number of defense business systems listed in the
department's authoritative business systems inventory--the Defense
Information Technology Portfolio Repository (DITPR)--with the number in
its IT budget system, the Select and Native Programming Data Input
System--Information Technology (SNAP-IT), with the number in the ETP.
Further, we reviewed and compared business system information, such as
legacy system migration information in the ETP, with the information
obtained from our recently completed and ongoing business system
reviews to determine whether the information was consistent. We
interviewed BTA officials to discuss any discrepancies. Furthermore, we
obtained and reviewed information from the Departments of the Air
Force, Army, and Navy on the extent to which they have made progress in
satisfying existing recommendations associated with developing their
respective ETPs.
* We were unable to determine whether DOD's fiscal year 2010
information technology budget submission was prepared in accordance
with the criteria set forth in the Act because the budget submission
was not released in time for us to review for this report. Instead, we
analyzed and compared information contained in the department's system
that is used to prepare its budget submission (SNAP-IT) with
information in the ETP and DOD's DITPR system to determine if DOD's
fiscal year 2009 budget request included all business systems. We
interviewed BTA and Assistant Secretary of Defense (Networks and
Information Integration)/Department of Defense Chief Information
Officer (ASD(NII)/DOD CIO) officials to discuss the accuracy and
comprehensiveness of information contained in the SNAP-IT system, the
discrepancies in the information contained in the ETP, DITPR, and SNAP-
IT systems, and efforts under way or planned to address these
discrepancies. DOD officials were not able to provide the supporting
data to address any discrepancies in the number of business systems
contained in DITPR in time for inclusion in our report.
* To determine whether DOD has established investment review structures
and processes, we focused on the one Investment Review Board specified
in the Act that we previously reported had yet to be established.
Accordingly, we obtained documentation from and interviewed cognizant
DOD officials about actions completed, under way, and planned relative
to the establishment of the DOD Chief Information Officer Investment
Review Board. We also obtained and reviewed documentation--such as DOD
IT Defense Business Systems Investment Review Process Guidance and
Operation of the Defense Acquisition System, Department of Defense
Instruction Number 5000.02,[Footnote 121] as well as the Air Force
Information Technology Investment Review Guide and Air Force
Information Technology Portfolio Management and IT Investment Review
[Footnote 122]--and interviewed knowledgeable DOD officials about
efforts to address DOD corporate and component investment management-
related weaknesses that we identified in previous reports. We also
reviewed and leveraged our previous reports that addressed DOD
corporate and component approaches to managing business system
investments.[Footnote 123]
* To determine whether the department was reviewing and approving
business system investments exceeding $1 million, we obtained
information from BTA on the number of defense business systems
certified and approved since our last annual review, including
information about Air Force, Army, and Navy actions that were taken in
order to perform the annual systems reviews as required pursuant to the
Act. In addition, we summarized the results of recent reports
associated with information used during the certification and annual
review process. We also interviewed BTA and ASD(NII)/DOD CIO officials
to determine the steps taken, planned, or under way to validate the
accuracy of the information in DITPR to be used by the review boards in
making certification and approval decisions. In addition, we analyzed
selected business system information contained in DITPR, such as system
life cycle start and end dates, to validate the reliability of the
information.
We did not independently validate the reliability of the cost and
budget figures provided by DOD because the specific amounts were not
relevant to our findings. We conducted this performance audit at DOD
offices in Arlington, Virginia, from January 2009 to May 2009, in
accordance with generally accepted government auditing standards. Those
standards require that we plan and perform the audit to obtain
sufficient, appropriate evidence to provide a reasonable basis for our
findings and conclusions based on our audit objectives. We believe that
the evidence obtained provides a reasonable basis for our findings and
conclusions based on our audit objective.
[End of section]
Appendix II: Comments from the Department of Defense:
Department of Defense:
Office Of Deputy Chief Management Officer:
9010 Defense Pentagon:
Washington, DC 20301-9010:
May 7, 2009:
Mr. Randolph C. Hite:
Director, Information Technology Architecture and Systems Issues:
U.S. Government Accountability Office:
441 G Street NW:
Washington, DC 20548:
Dear Mr. Hite:
This is the Department of Defense (DoD) response to the (GAO draft
report 09-586, "DOD Business Systems Modernization: Recent Slowdown in
Institutionalizing Key Management Controls Needs to Be Addressed" dated
April 27, 2009 (GAO Code 310675).
The Department welcomes GAO's insight and acknowledgement of its
business systems modernization progress. DOD believes that it has made
important progress over the past year while simultaneously implementing
recently passed statutes involving changes to the management structure
for its business operations. This progress partly addresses open
business systems modernization GAO recommendations and DOD will
continue to take steps to address open recommendations.
The Department partially concurs with GAO's recommendation to resolve
issues surrounding the roles, responsibilities, authorities, and
relationships of the Deputy Chief Management Officer (DCMO) and the
Military Departments' Chief Management Officers (CMOs). DOD agrees that
additional clarity would be useful in defining the roles and
responsibilities of these positions and DOD is committed to resolving
this ambiguity through formal policy sometime in the future. However,
the Department believes that the DOD DCMO has the necessary authority,
working on behalf of the Deputy Secretary of Defense, and a
sufficiently close working relationship with the DCMOs of the Military
Departments to make significant strides in the Department's business
operations improvement efforts, even in the absence of near-term,
formal guidance.
DOD partially concurs with the recommendation regarding the alignment
of the data in the Defense Information Technology Portfolio Repository
(DITPR) and Select and Native Programming Data Input System --
Information Technology (SNaP-IT) system data repositories. The
Department recognizes the need to reconcile the information between the
two systems. and has taken some steps in recent years to accomplish
this, such as updating the Financial Management Regulation to include
the requirement for Components to enter data in the two systems using a
one-to-one relationship for all defense business systems, and is
currently developing a plan to further align the data. However, DoD
believes that the quality of the data in both systems supports the
purposes for which those systems are intended to he used.
We appreciate the support of GAO as the Department further advances in
its business transformation efforts, and look forward to continuing our
partnership in achieving our shared goals.
Signed by:
Elizabeth A. McGrath:
Assistant Deputy Chief Management Officer:
[End of letter]
GAO Draft Report Dated April 24, 2009:
GAO-09-586 (GAO Code 310675):
"DOD Business Systems Modernization: Recent Slowdown In
Institutionalizing Key Management Controls Needs To Be Addressed"
Department Of Defense Comment To The GAO Recommendations:
Recommendation 1: The GAO recommends that the Secretary of Defense
direct the Deputy Secretary of Defense to resolve the issues
surrounding the roles, responsibilities, authorities, and relationships
of the Deputy Chief Management Officer and the military department
Chief Management Officers relative to the Business Enterprise
Architecture and enterprise transition plan federation and business
system investment management. (p. 61/GAO Draft Report)
DOD Response: Partially Concur. The Department partially concurs with
GAO's recommendation to resolve issues surrounding the roles,
responsibilities, authorities, and relationships of the Deputy Chief
Management Officer (DCMO) and the Military Departments' Chief
Management Officers (CMOs). DoD agrees that additional clarity would be
useful in defining the roles and responsibilities of these positions
and DoD is committed to resolving this ambiguity through formal policy
in the near future. However, the Department believes that the DoD DCMO
has the necessary authority, working on behalf of the Deputy Secretary
of Defense, and a sufficiently close working relationship with the
DCMOs of the Military Departments to make significant strides in the
Department's business operations improvement efforts, even in the
absence of near-term formal guidance. Federation of the Business
Enterprise Architecture and Enterprise Transition Plan and improvement
or the business system investment management process remain key
objectives of the Department's improvement efforts. The Office of the
DoD DCMO, in conjunction with the Business Transformation Agency, is
currently working with the Military Department DCMOs and other
appropriate officials to advance these initiatives.
Recommendation 2: The GAO recommends that the Secretary of Defense
direct the appropriate DOD organizations to develop and implement plans
for reconciling and validating the completeness and reliability of
information in its Defense Information Technology Portfolio Repository
(DITPR) and Select and Native Programming Data input System -
Information Technology (SNaP-IT) system data repositories, and to
include information on the status of these efforts in the department's
FY 2010 report in response to the act. (p. 61/GAO Draft Report)
DOD Response: Partially Concur. DOD agrees with the GAO recommendation
to synchronize information stored in SNaP-IT and DITPR, and has already
taken steps to address this need. Currently, a many-to-many
relationship exists between "Systems" for which technical information
is stored in DITPR, and "initiatives" for which financial information
is stored in SNaP-IT. An update to the regulation that provides
financial management policy and procedures to the DOD was issued in
June 2007[Footnote 125] requiring components to start entering
information in both DITPR and SNaP-IT using a one-to-one relationship
for all defense business systems. The Department of Defense Chief
Information Officer (DOD CIO) is now working with the components to
help facilitate implementation of that policy. This policy is also
stated in guidance issued in July 2008.[Footnote 126]
In addition, the DOD CIO and the Office of Program Analysis and
Evaluation (PA&E) are currently corking On a plan to modify both DITPR
and SNaP-IT to eliminate the duplication of data and use web services
to provide seamless integration of the two systems. Completion of the
technical effort is expected in the next 12 months. Challenges to
completing the non-technical aspects of this effort include: a) changes
in component-level policies and practices for budgeting and reporting
information technology (IT) systems and by alignment of IT investments
currently reported in SNaP-IT and DITPR. DOD CIO will collaborate with
the components to make the necessary changes to these policies and
practices.
However, the Department disagrees with the GAO's implication that the
data in the two systems is not reliable. It should be noted that
differences in information between the two systems are due to the
information being collected and displayed for different purposes.
Current Investment Review Board (IRB) Guidance states that a program's
Program Manager (PM) ensures and the Pre-Certification Authority (PCA)
validates the information in DITPR as being current. complete and
accurate. In addition. the DOD CIO currently requires components to
certify the completeness and accuracy of required data in both DITPR
and SNaP-IT. There has been significant improvement in the quality of
information in both systems since the implementation of this
requirement. DOD CIO believes the quality of information in both
systems is complete and accurate enough to support their purposes.
[End of section]
Appendix III: GAO Contact and Staff Acknowledgments:
GAO Contact:
Randolph C. Hite, (202) 512-3439 or hiter@gao.gov:
Staff Acknowledgments:
In addition to the contact person named above, key contributors to this
report were Neelaxi Lakhmani (Assistant Director), Justin Booth,
Michael Holland, Anh Le, Emily Longcore, Lee McCracken, Christine San,
Sylvia Shanks, Jennifer Stavros-Turner, and Adam Vodraska.
[End of section]
Footnotes:
[1] Business systems support DOD's business operations, such as
civilian personnel, finance, health, logistics, military personnel,
procurement, and transportation.
[2] GAO, High-Risk Series: An Update, [hyperlink,
http://www.gao.gov/products/GAO-09-271] (Washington, D.C.: Jan. 22,
2009).
[3] An enterprise architecture, or modernization blueprint, provides a
clear and comprehensive picture of an entity, whether it is an
organization (e.g., federal department or agency) or a functional or
mission area that cuts across more than one organization (e.g.,
financial management). This picture consists of snapshots of the
enterprise's current or "as is" operational and technological
environment and its target or "to be" environment, and contains a
capital investment road map for transitioning from the current to the
target environment. These snapshots consist of "views," which are
basically one or more architecture products that provide conceptual or
logical representations of the enterprise.
[4] GAO, Information Technology: Architecture Needed to Guide
Modernization of DOD's Financial Operations, [hyperlink,
http://www.gao.gov/products/GAO-01-525] (Washington, D.C.: May 17,
2001).
[5] See for example, GAO, DOD Business Systems Modernization: Long-
standing Weaknesses in Enterprise Architecture Development Need to Be
Addressed, [hyperlink, http://www.gao.gov/products/GAO-05-702]
(Washington, D.C.: July 22, 2005); DOD Business Systems Modernization:
Billions Being Invested without Adequate Oversight, [hyperlink,
http://www.gao.gov/products/GAO-05-381] (Washington, D.C.: Apr. 29,
2005); DOD Business Systems Modernization: Limited Progress in
Development of Business Enterprise Architecture and Oversight of
Information Technology Investments, [hyperlink,
http://www.gao.gov/products/GAO-04-731R] (Washington, D.C.: May 17,
2004); DOD Business Systems Modernization: Important Progress Made to
Develop Business Enterprise Architecture, but Much Work Remains,
[hyperlink, http://www.gao.gov/products/GAO-03-1018] (Washington, D.C.:
Sept. 19, 2003); Business Systems Modernization: Summary of GAO's
Assessment of the Department of Defense's Initial Business Enterprise
Architecture, [hyperlink, http://www.gao.gov/products/GAO-03-877R]
(Washington, D.C.: July 7, 2003); Information Technology: Observations
on Department of Defense's Draft Enterprise Architecture, [hyperlink,
http://www.gao.gov/products/GAO-03-571R] (Washington, D.C.: Mar. 28,
2003); DOD Business Systems Modernization: Improvements to Enterprise
Architecture Development and Implementation Efforts Needed, [hyperlink,
http://www.gao.gov/products/GAO-03-458] (Washington, D.C.: Feb. 28,
2003); and [hyperlink, http://www.gao.gov/products/GAO-01-525].
[6] Ronald W. Reagan National Defense Authorization Act for Fiscal Year
2005, Pub. L. No. 108-375, § 332, 118 Stat. 1811, 1851-1856 (Oct. 28,
2004) (codified in part at 10 U.S.C. § 2222).
[7] GAO, DOD Business Systems Modernization: Progress in Establishing
Corporate Management Controls Needs to Be Replicated Within Military
Departments, [hyperlink, http://www.gao.gov/products/GAO-08-705]
(Washington, D.C.: May 15, 2008).
[8] See for example, GAO, DOD Business Systems Modernization: Key
Marine Corps System Acquisition Needs to Be Better Justified, Defined,
and Managed, [hyperlink, http://www.gao.gov/products/GAO-08-822]
(Washington, D.C.: July 28, 2008); DOD Business Systems Modernization:
Key Navy Programs' Compliance with DOD's Federated Business Enterprise
Architecture Needs to Be Adequately Demonstrated, [hyperlink,
http://www.gao.gov/products/GAO-08-972] (Washington, D.C.: Aug. 7,
2008); and DOD Business Systems Modernization: Important Management
Controls Being Implemented on Major Navy Program, but Improvements
Needed in Key Areas, [hyperlink,
http://www.gao.gov/products/GAO-08-896] (Washington, D.C.: Sept. 8,
2008).
[9] GAO, Business Systems Modernization: DOD Continues to Improve
Institutional Approach, but Further Steps Needed, [hyperlink,
http://www.gao.gov/products/GAO-06-658] (Washington, D.C.: May 15,
2006).
[10] See, for example, GAO, DOD Travel Cards: Control Weaknesses
Resulted in Millions of Dollars of Improper Payments, [hyperlink,
http://www.gao.gov/products/GAO-04-576] (Washington, D.C.: June 9,
2004); Military Pay: Army National Guard Personnel Mobilized to Active
Duty Experienced Significant Pay Problems, [hyperlink,
http://www.gao.gov/products/GAO-04-89] (Washington, D.C.: Nov. 13,
2003); and Defense Inventory: Opportunities Exist to Improve Spare
Parts Support Aboard Deployed Navy Ships, [hyperlink,
http://www.gao.gov/products/GAO-03-887] (Washington, D.C.: Aug. 29,
2003).
[11] [hyperlink, http://www.gao.gov/products/GAO-09-271].
[12] These 8 high-risk areas are DOD's overall approach to business
transformation, business systems modernization, financial management,
the personnel security clearance program, supply chain management,
support infrastructure management, weapon systems acquisition, and
contract management.
[13] The 7 governmentwide high-risk areas are disability programs,
ensuring the effective protection of technologies critical to U.S.
national security interests, interagency contracting, information
systems and critical infrastructure, information sharing for homeland
security, human capital, and real property.
[14] 40 U.S.C. § 11315(b)(2).
[15] 44 U.S.C. § 3602(f)(14).
[16] GAO, Information Technology Investment Management: A Framework for
Assessing and Improving Process Maturity, [hyperlink,
http://www.gao.gov/products/GAO-04-394G] (Washington, D.C.: March
2004); Information Technology: A Framework for Assessing and Improving
Enterprise Architecture Management, Version 1.1, [hyperlink,
http://www.gao.gov/products/GAO-03-584G] (Washington, D.C.: April
2003); OMB Capital Programming Guide, Version 1.0 (July 1997); and CIO
Council, A Practical Guide to Federal Enterprise Architecture, Version
1.0 (February 2001).
[17] [hyperlink, http://www.gao.gov/products/GAO-03-584G].
[18] OMB, Improving Agency Performance Using Information and
Information Technology (Enterprise Architecture Assessment Framework
v3.0) (December 2008).
[19] 40 U.S.C. § 11302(c)(1). The Clinger-Cohen Act of 1996 expanded
the responsibilities of OMB and the agencies that had been set under
the Paperwork Reduction Act with regard to IT management. See 44 U.S.C.
3504(a)(1)(B)(vi) (OMB); 44 U.S.C. 3506(h)(5) (agencies).
[20] We have made recommendations to improve OMB's process for
monitoring high-risk IT investments; see GAO, Information Technology:
OMB Can Make More Effective Use of Its Investment Reviews, GAO-05-276
(Washington, D.C.: Apr. 15, 2005).
[20] This policy is set forth and guidance is provided in OMB Circular
No. A-11 (Nov. 2, 2005) (section 300), and in OMB's Capital Programming
Guide, which directs agencies to develop, implement, and use a capital
programming process to build their capital asset portfolios.
[22] See for example, GAO, Cost Estimating and Assessment Guide: Best
Practices for Developing and Managing Capital Program Costs,
[hyperlink, http://www.gao.gov/products/GAO-09-3SP] (Washington, D.C.:
March 2009); [hyperlink, http://www.gao.gov/products/GAO-04-394G];
[hyperlink, http://www.gao.gov/products/GAO-03-584G]; and Assessing
Risks and Returns: A Guide for Evaluating Federal Agencies' IT
Investment Decision-making, [hyperlink,
http://www.gao.gov/products/GAO/AIMD-10.1.13] (Washington, D.C.:
February 1997).
[23] J. A. Zachman "A Framework for Information Systems Architecture,"
IBM Systems Journal 26, no. 3 (1987).
[24] DOD, Department of Defense Architecture Framework, Version 1.5,
Volumes I-III (April 2007).
[25] See, for example, GAO, Federal Aviation Administration: Stronger
Architecture Program Needed to Guide Systems Modernization Efforts,
[hyperlink, http://www.gao.gov/products/GAO-05-266] (Washington, D.C.:
Apr. 29, 2005); Homeland Security: Efforts Under Way to Develop
Enterprise Architecture, but Much Work Remains, [hyperlink,
http://www.gao.gov/products/GAO-04-777] (Washington, D.C.: Aug. 6,
2004); [hyperlink, http://www.gao.gov/products/GAO-04-731R];
Information Technology: Architecture Needed to Guide NASA's Financial
Management Modernization, [hyperlink,
http://www.gao.gov/products/GAO-04-43] (Washington, D.C.: Nov. 21,
2003); GAO-03-1018; [hyperlink,
http://www.gao.gov/products/GAO-03-877R]; Information Technology: DLA
Should Strengthen Business Systems Modernization Architecture and
Investment Activities, [hyperlink,
http://www.gao.gov/products/GAO-01-631] (Washington, D.C.: June 29,
2001); and Information Technology: INS Needs to Better Manage the
Development of Its Enterprise Architecture, [hyperlink,
http://www.gao.gov/products/GAO/AIMD-00-212] (Washington, D.C.: Aug. 1,
2000).
[26] [hyperlink, http://www.gao.gov/products/GAO-03-584G].
[27] GAO, Information Technology: FBI Has Largely Staffed Key
Modernization Program, but Strategic Approach to Managing Program's
Human Capital Is Needed, [hyperlink,
http://www.gao.gov/products/GAO-07-19] (Washington, D.C.: Oct. 16,
2006).
[28] [hyperlink, http://www.gao.gov/products/GAO-04-394G]; [hyperlink,
http://www.gao.gov/products/GAO/AIMD-10.1.13]; GAO, Executive Guide:
Improving Mission Performance Through Strategic Information Management
and Technology, [hyperlink,
http://www.gao.gov/products/GAO/AIMD-94-115] (Washington, D.C.: May
1994); and OMB, Evaluating Information Technology Investments, A
Practical Guide (Washington, D.C.: November 1995).
[29] [hyperlink, http://www.gao.gov/products/GAO-04-394G].
[30] GAO, Information Technology: SSA Has Taken Key Steps for Managing
Its Investments, but Needs to Strengthen Oversight and Fully Define
Policies and Procedures, [hyperlink,
http://www.gao.gov/products/GAO-08-1020] (Washington, D.C.: Sept. 12,
2008); Information Technology: Treasury Needs to Strengthen Its
Investment Board Operations and Oversight, [hyperlink,
http://www.gao.gov/products/GAO-07-865] (Washington, D.C.: July 23,
2007); Information Technology: DHS Needs to Fully Define and Implement
Policies and Procedures for Effectively Managing Investments,
[hyperlink, http://www.gao.gov/products/GAO-07-424] (Washington, D.C.:
Apr. 27, 2007); Information Technology: Centers for Medicare & Medicaid
Services Needs to Establish Critical Investment Management
Capabilities, [hyperlink, http://www.gao.gov/products/GAO-06-12]
(Washington, D.C.: Oct. 28, 2005); Information Technology: HHS Has
Several Investment Management Capabilities in Place, but Needs to
Address Key Weaknesses, [hyperlink,
http://www.gao.gov/products/GAO-06-11] (Washington, D.C.: Oct. 28,
2005); Information Technology Management: Census Bureau Has Implemented
Many Key Practices, but Additional Actions Are Needed, [hyperlink,
http://www.gao.gov/products/GAO-05-661] (Washington, D.C.: June 16,
2005); Information Technology: FAA Has Many Investment Management
Capabilities in Place, but More Oversight of Operational Systems Is
Needed, [hyperlink, http://www.gao.gov/products/GAO-04-822]
(Washington, D.C.: Aug. 20, 2004); Information Technology: Departmental
Leadership Crucial to Success of Investment Reforms at Interior,
[hyperlink, http://www.gao.gov/products/GAO-03-1028] (Washington, D.C.:
Sept. 12, 2003); Bureau of Land Management: Plan Needed to Sustain
Progress in Establishing IT Investment Management Capabilities,
[hyperlink, http://www.gao.gov/products/GAO-03-1025] (Washington, D.C.:
Sept. 12, 2003); United States Postal Service: Opportunities to
Strengthen IT Investment Management Capabilities, [hyperlink,
http://www.gao.gov/products/GAO-03-3] (Washington, D.C.: Oct. 15,
2002); and Information Technology: DLA Needs to Strengthen Its
Investment Management Capability, [hyperlink,
http://www.gao.gov/products/GAO-02-314] (Washington, D.C.: Mar. 15,
2002).
[31] 40 U.S.C. §§ 11311-11313.
[32] Pub. L. No. 110-181 § 904 (2008).
[33] Pub. L. No. 110-181 § 904 (2008).
[34] Pub. L. No. 110-417 § 908 (2008).
[35] Ronald W. Reagan National Defense Authorization Act for Fiscal
Year 2005, Pub. L. No. 108-375, § 332, 118 Stat. 1811, 1851-1856 (Oct.
28, 2004) (codified in part at 10 U.S.C. § 2222).
[36] [hyperlink, http://www.gao.gov/products/GAO-06-219], [hyperlink,
http://www.gao.gov/products/GAO-06-658], [hyperlink,
http://www.gao.gov/products/GAO-07-733], and [hyperlink,
http://www.gao.gov/products/GAO-08-705].
[37] [hyperlink, http://www.gao.gov/products/GAO-08-972].
[38] [hyperlink, http://www.gao.gov/products/GAO-09-272R].
[39] [hyperlink, http://www.gao.gov/products/GAO-09-272R].
[40] [hyperlink, http://www.gao.gov/products/GAO-08-705].
[41] Information assurance refers to measures that defend and protect
information and information systems by ensuring their confidentiality,
integrity, authenticity, availability, and utility.
[42] The W3C XML-Encryption Syntax and Processing standard provides end-
to-end security for applications that require secure exchange of XML
data. Agile Web services applications in need of secure and reliable
data can use this standard to prevent interception, alteration, and
unauthorized decryption of information.
[43] An expeditionary environment is one in which warfighters are
deployed away from their home base and where network access, bandwidth,
and reliable infrastructure are constrained in comparison with the
normal DOD business environment in the continental United States.
[44] The BEA is organized around six business enterprise priority
areas. The Common Supplier Engagement priority area seeks to
standardize the methods that DOD uses to interact with commercial and
government suppliers in the acquisition of catalog, stock, as well as
made-to-order and engineer-to-order goods and services. It also
provides the associated visibility of supplier-related information to
the warfighting and business mission areas. The other business
enterprise priority areas are Personnel Visibility, Acquisition
Visibility, Materiel Visibility, Real Property Accountability, and
Financial Visibility.
[45] An indefinite delivery/indefinite quantity contract is a type of
contract that provides, within stated limits, for an indefinite
quantity of supplies or services during a fixed period of time.
[46] The File Discrepancy Report for Other Goods and Services business
process includes listing goods or services that were not accepted, the
reasons for rejection, and processing discrepancy dispute updates.
[47] The Awarded Contract information exchange represents a contract
that has been awarded to an external supplier.
[48] The Receipt Account Trial Balance and Ledgers information exchange
contains detailed receipt transactions and balances reported by DOD
during the month.
[49] Deliver Property and Forces describes activities for issuing,
transporting, and delivering property, materiel, and forces.
[50] The Approved Payment Request information exchange is a request for
payment from a vendor or other party owed by the government that has
been approved and confirmed to comply with the terms and conditions of
the contract.
[51] The Payment Request for Goods data exchange is a request for
payment for goods from a vendor or other party owed by the government.
[52] The Accounts Payable Account information exchange is a summary of
general ledger accounts used for financial reporting.
[53] The Final Contract or Order Costs information exchange is a
determination of the final cost of a contract or intragovernmental
order that is not firm-fixed price and must be reconciled prior to
contract or order closeout; the Estimate at Completion information
exchange is the estimated total cost for all authorized work.
[54] The operational information exchange product describes the
information exchanges associated with operational activities.
[55] Budget to Report encompasses all business functions necessary to
plan, formulate, create, execute against, and report on the budget and
business activities of the entity, including updates to the general
ledger.
[56] The Execute Apportionment and Allocate Funds business process
involves recording an agency's budgetary resources and supporting the
establishment of legal budgetary limitations within the agency. It also
involves supporting the establishment of funding to agencies that are
not subject to apportionment.
[57] A create, read, update, and delete matrix shows the specific
business functions and applications that create, read, update, and/or
delete specific data elements, which enables the organization to
develop applications.
[58] Approved Apportionment is the notification from OMB that DOD's
apportionment request has been approved and is available for
distribution to the components and/or services.
[59] [hyperlink, http://www.gao.gov/products/GAO-08-705], [hyperlink,
http://www.gao.gov/products/GAO-07-733], and [hyperlink,
http://www.gao.gov/products/GAO-06-658].
[60] GAO, Business Systems Modernization: Strategy for Evolving DOD's
Business Enterprise Architecture Offers a Conceptual Approach, but
Execution Details Are Needed, [hyperlink,
http://www.gao.gov/products/GAO-07-451] (Washington, D.C.: Apr. 16,
2007).
[61] According to DOD, the global information grid consists of a
globally interconnected, end-to-end set of information capabilities,
associated processes, and personnel for collecting, processing,
storing, disseminating, and managing information on demand to
warfighters, policymakers, and support personnel, and as such
represents the department's IT architecture. The global information
grid strategy provides for federating the many and varied architectures
across the department's four mission areas--Warfighting, Business, DOD
Intelligence, and Enterprise Information Environment. It was issued in
August 2007 by ASD(NII)/DOD CIO.
[62] [hyperlink, http://www.gao.gov/products/GAO-08-705].
[63] Metadata is information (attributes) about artifacts (e.g., a
description of the artifact or author of the artifact).
[64] Search and discovery capabilities are intended to enable discovery
of architecture metadata and services stored in repositories.
[65] An architecture model is a template for creating an architecture
view. It is intended to allow understandability by users and
interoperability between architectures.
[66] An access control mechanism is a means for determining the
permissible activities of users and authorizing or prohibiting
activities by each user.
[67] Use of an independent verification and validation agent is an
architecture management best practice for identifying architecture
strengths and weaknesses and disclosing to department and congressional
oversight bodies the information they need to better ensure that DOD's
family of architectures and associated transition plans satisfy key
quality parameters.
[68] [hyperlink, http://www.gao.gov/products/GAO-07-733].
[69] [hyperlink, http://www.gao.gov/products/GAO-08-519].
[70] [hyperlink, http://www.gao.gov/products/GAO-03-584G].
[71] From 2006 to 2008, DOD's March Congressional Report also
represented an update of its ETP. However, this year's March
Congressional Report does not include an ETP update. As a result, the
most recent version of the ETP was released in September 2008.
According to BTA, the department is revisiting its approach to
releasing the ETP.
[72] Key transformational objectives include the business enterprise
priorities: Personnel Visibility, Acquisition Visibility, Materiel
Visibility, Common Supplier Engagement, Real Property Accountability,
and Financial Visibility.
[73] Time-phased milestones refer to milestones, such as milestone A
(which occurs at the end of the Material Solution Analysis phase),
milestone B (which occurs at the completion of the Technology
Development phase), milestone C (which occurs at the end of the
Engineering and Manufacturing Development phase), initial operating
capability, and full operating capability.
[74] [hyperlink, http://www.gao.gov/products/GAO-08-705].
[75] [hyperlink, http://www.gao.gov/products/GAO-03-584G] and CIO
Council, A Practical Guide to Federal Enterprise Architecture, Version
1.0 (February 2001).
[76] Net-Centric Enterprise Services is intended to provide
capabilities that are key to enabling ubiquitous access to reliable
decision-quality information. Its capabilities include a service-
oriented architecture foundation (e.g., security and information
assurance), collaboration (e.g., application sharing), content
discovery and delivery (e.g., delivering information across the
enterprise), and portal (e.g., user-defined Web-based presentation).
[77] Enterprise application integration software is a commercial
software product, commonly referred to as middleware, to permit two or
more incompatible systems to exchange data from different databases.
[78] The Navy Enterprise Resource Planning program is to standardize
the Navy's business processes, such as acquisition and financial
management.
[79] [hyperlink, http://www.gao.gov/products/GAO-08-705].
[80] Of the 2,100 systems, 600 are categorized as either national
security systems (i.e., intelligence systems, cryptologic activities
related to national security, military command and control systems, and
equipment that is an integral part of a weapon or weapons system or is
critical to the direct fulfillment of military or intelligence missions
or systems that store, process, or communicate classified information)
or are not within the business mission area (e.g., warfighting mission
area).
[81] 40 U.S.C. § 11312.
[82] [hyperlink, http://www.gao.gov/products/GAO-04-394G].
[83] [hyperlink, http://www.gao.gov/products/GAO-08-705].
[84] The four IRBs are for (1) Financial Management, (2) Weapon Systems
Lifecycle Management and Materiel Supply and Services Management, (3)
Real Property and Installations Lifecycle Management, and (4) Human
Resources Management.
[85] The Enterprise Information Environment Mission Area enables the
functions of the other mission areas (e.g., Warfighting Mission Area,
Business Mission Area, and Defense Intelligence Mission Area) and
encompasses communications, computing, and core enterprise service
systems, equipment, or software that provides a common information
capability or service for enterprise use.
[86] [hyperlink, http://www.gao.gov/products/GAO-08-705].
[87] [hyperlink, http://www.gao.gov/products/GAO-08-705].
[88] Secretary of Navy Instruction 5230.14.
[89] [hyperlink, http://www.gao.gov/products/GAO-07-538].
[90] DOD Instruction 5000.02, Dec. 2, 2008.
[91] The Joint Capabilities Integration and Development System is a
need-driven management system used to identify future capabilities for
DOD, and the Defense Acquisition System is an event-driven system for
managing product development and procurement and guides the acquisition
process for DOD.
[92] According to DOD, the component functional sponsor is the
component executive responsible for defining and managing capabilities,
verifying that capability requirements are met, representing the user
community's interests, and ensuring funding for defense business system
investments.
[93] According to DOD, the milestone decision authority is the
designated individual who has overall responsibility for an investment.
This person has the authority to approve an investment's progression in
the acquisition process and is responsible for reporting cost,
schedule, and performance results. For example, the milestone decision
authority for a Major Automated Information System is the ASD(NII)/DOD
CIO or a designee.
[94] DOD, Chairman of the Joint Chiefs of Staff Instruction: Joint
Capabilities Integration and Development System, 3170.01G, March 1,
2009.
[95] [hyperlink, http://www.gao.gov/products/GAO-07-538].
[96] The Planning, Programming, Budgeting, and Execution process is a
calendar-driven management system for allocating resources and
comprises four phases--planning, programming, budgeting, and executing--
that define how budgets for each DOD component and the department as a
whole are created, vetted, and executed.
[97] Directive-Type Memorandum 08-020 "Investment Review Board Roles
and Responsibilities," signed by the Deputy Secretary of Defense (Jan.
26, 2009).
[98] The certification authorities are the Under Secretary of Defense
for Acquisition, Technology, and Logistics; the Under Secretary of
Defense (Comptroller); Under Secretary of Defense for Personnel and
Readiness; ASD(NII)/DOD CIO; and the Deputy Secretary of Defense.
[99] [hyperlink, http://www.gao.gov/products/GAO-08-52] and [hyperlink,
http://www.gao.gov/products/GAO-08-53].
[100] U.S. Air Force, Air Force Instruction 33-141: Air Force
Information Technology Portfolio Management and IT Investment Review,
Dec. 23, 2008, and Air Force Information Technology Investment Review
Guide, Version 2.2, Nov. 24, 2008.
[101] The approval authorities, as discussed earlier in this report,
are the Under Secretary of Defense for Acquisition, Technology, and
Logistics; the Under Secretary of Defense (Comptroller); the Under
Secretary of Defense for Personnel and Readiness; the ASD(NII)/DOD CIO;
and the Deputy Secretary of Defense. They are responsible for the
review, approval, and oversight of business systems and must establish
investment review processes for systems under their cognizance.
[102] The Act requires certification by designated approval authorities
that the defense business system modernization is (1) in compliance
with the enterprise architecture, (2) necessary to achieve critical
national security capability or address a critical requirement in an
area such as safety or security, or (3) necessary to prevent a
significant adverse effect on a project that is needed to achieve an
essential capability, taking into consideration the alternative
solutions for preventing such an adverse effect.
[103] 10 U.S.C.§2222(b); 31 U.S.C.§1341(a) (1) (A).
[104] [hyperlink, http://www.gao.gov/products/GAO-06-171], [hyperlink,
http://www.gao.gov/products/GAO-06-215], [hyperlink,
http://www.gao.gov/products/GAO-08-972], [hyperlink,
http://www.gao.gov/products/GAO-08-822], and [hyperlink,
http://www.gao.gov/products/GAO-08-896].
[105] The one system that was not certified and approved as compliant
was certified and approved as meeting the Act's other condition--being
necessary to achieve a critical national security capability or address
a critical requirement in an area such as safety or security.
[106] [hyperlink, http://www.gao.gov/products/GAO-08-972].
[107] See, for example, [hyperlink,
http://www.gao.gov/products/GAO-06-215], GAO-06-171, [hyperlink,
http://www.gao.gov/products/GAO-08-822], GAO-08-896, and [hyperlink,
http://www.gao.gov/products/GAO-08-922].
[108] [hyperlink, http://www.gao.gov/products/GAO-08-822].
[109] [hyperlink, http://www.gao.gov/products/GAO-08-896].
[110] The Contractor Performance Assessment Reporting System is a Web-
enabled application that collects and manages a library of automated
contractor performance reports.
[111] The Air Force's Virtual Personnel Service Center is to provide
the Air Force unique human resources services not provided by the
Defense Integrated Military Human Resources System.
[112] The Armed Forces Health Longitudinal Technology Application is
the military's electronic health record system.
[113] The Wide Area Workflow System is an enterprise solution for
electronic submission, acceptance and processing of invoices and
receiving reports, and matching them with contracts to authorize
payment.
[114] The preceding information about business system life cycle start
and end dates was obtained from DOD's March 2009 DITPR data.
Nevertheless, the specific examples cited in this report (e.g., BTA's
Wide Area Workflow System) are defined as business systems in DOD's
SNAP-IT system and were reported as business systems in DOD's fiscal
year 2009 budget request.
[115] [hyperlink, http://www.gao.gov/products/GAO-09-272R].
[116] Ronald W. Reagan National Defense Authorization Act for Fiscal
Year 2005, Pub. L. No. 108-375, § 332, 118 Stat. 1811, 1851-1856 (Oct.
28, 2004).
[117] GAO, DOD Business Systems Modernization: Progress in Establishing
Corporate Management Controls Needs to Be Replicated within Military
Departments, [hyperlink, http://www.gao.gov/products/GAO-08-705]
(Washington, D.C.: May 15, 2008).
[118] GAO, DOD Business Systems Modernization: Important Progress Made
in Establishing Foundational Architecture Products and Investment
Management Practices, but Much Work Remains, [hyperlink,
http://www.gao.gov/products/GAO-06-219] (Washington, D.C.: Nov. 23,
2005).
[119] GAO, DOD Business Systems Modernization: Military Departments
Need to Strengthen Management of Enterprise Architectures, [hyperlink,
http://www.gao.gov/products/GAO-08-519] (Washington D.C.: May 12,
2008).
[120] [hyperlink, http://www.gao.gov/products/GAO-08-705].
[121] DOD, DOD IT Defense Business Systems Investment Review Process
Guidance, January 2009, and Operation of the Defense Acquisition
System, Department of Defense Instruction Number 5000.02, Dec. 2, 2008.
[1222] U.S. Air Force, Air Force Information Technology Investment
Review Guide, Ver. 2.2, Nov. 24, 2008, and Air Force Instruction 33-
141: Air Force Information Technology Portfolio Management and IT
Investment Review, Dec. 23, 2008.
[123] GAO, Business Systems Modernization: DOD Needs to Fully Define
Policies and Procedures for Institutionally Managing Investments,
[hyperlink, http://www.gao.gov/products/GAO-07-538] (Washington, D.C.:
May 11, 2007); Business Systems Modernization: Air Force Needs to Fully
Define Policies and Procedures for Institutionally Managing
Investments, [hyperlink, http://www.gao.gov/products/GAO-08-52]
(Washington D.C.: Oct. 31, 2007); Business Systems Modernization:
Department of the Navy Needs to Establish Management Structure and
Fully Define Policies and Procedures for Institutionally Managing
Investments, [hyperlink, http://www.gao.gov/products/GAO-08-53]
(Washington D.C.: Oct. 31, 2007).
[124] GAO, DOD Business Systems Modernization: Key Marine Corps System
Acquisition Needs to Be Better Justified, Defined, and Managed,
[hyperlink, http://www.gao.gov/products/GAO-08-822] (Washington, D.C.:
July 28, 2008); DOD Business Systems Modernization: Key Navy Programs'
Compliance with DOD's Federated Business Enterprise Architecture Needs
to Be Adequately Demonstrated, [hyperlink,
http://www.gao.gov/products/GAO-08-972] (Washington, D.C.: Aug. 7,
2008); and DOD Business Systems Modernization: Important Management
Controls Being Implemented on Major Navy Program, but Improvements
Needed in Key Areas, [hyperlink,
http://www.gao.gov/products/GAO-08-896] (Washington, D.C.: Sept. 8,
2008).
[125] Financial Management Regulation". DOD 7000.1.14-R. Volume 2B,
Chapter 18, Section 180103.G, issued under the authority of DoD
Instruction 7000.14, "DOD Financial Management Policy and Procedures."
[126] Office of the Secretary of Defense (OSD) Guidance for FY2010
Information Technology Submissions.
[End of section]
GAO's Mission:
The Government Accountability Office, the audit, evaluation and
investigative arm of Congress, exists to support Congress in meeting
its constitutional responsibilities and to help improve the performance
and accountability of the federal government for the American people.
GAO examines the use of public funds; evaluates federal programs and
policies; and provides analyses, recommendations, and other assistance
to help Congress make informed oversight, policy, and funding
decisions. GAO's commitment to good government is reflected in its core
values of accountability, integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each
weekday, GAO posts newly released reports, testimony, and
correspondence on its Web site. To have GAO e-mail you a list of newly
posted products every afternoon, go to [hyperlink, http://www.gao.gov]
and select "E-mail Updates."
Order by Phone:
The price of each GAO publication reflects GAO‘s actual cost of
production and distribution and depends on the number of pages in the
publication and whether the publication is printed in color or black and
white. Pricing and ordering information is posted on GAO‘s Web site,
[hyperlink, http://www.gao.gov/ordering.htm].
Place orders by calling (202) 512-6000, toll free (866) 801-7077, or
TDD (202) 512-2537.
Orders may be paid for using American Express, Discover Card,
MasterCard, Visa, check, or money order. Call for additional
information.
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]:
E-mail: fraudnet@gao.gov:
Automated answering system: (800) 424-5454 or (202) 512-7470:
Congressional Relations:
Ralph Dawn, Managing Director, dawnr@gao.gov:
(202) 512-4400:
U.S. Government Accountability Office:
441 G Street NW, Room 7125:
Washington, D.C. 20548:
Public Affairs:
Chuck Young, Managing Director, youngc1@gao.gov:
(202) 512-4800:
U.S. Government Accountability Office:
441 G Street NW, Room 7149:
Washington, D.C. 20548: